P. Baldi, S. Brunak, Y. Chauvin, C. Andersen, H. Nielsen et al., Assessing the accuracy of prediction algorithms for classification: an overview, Proceedings of the 7th ACM Workshop on Artificial Intelligence and Security, pp.412-436, 2000.
DOI : 10.1093/bioinformatics/16.5.412

I. Firdausi, C. Lim, and A. Erwin, Analysis of Machine learning Techniques Used in Behavior-Based Malware Detection, 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies, pp.201-203, 2010.
DOI : 10.1109/ACT.2010.33

S. Forrest, S. Hofmeyr, and A. Somayaji, The Evolution of System-Call Monitoring, 2008 Annual Computer Security Applications Conference (ACSAC), pp.418-430, 2008.
DOI : 10.1109/ACSAC.2008.54

S. Gambs, A. Gmati, and M. Hurfin, Reconstruction Attack through Classifier Analysis, Proceedings of the 26th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, pp.274-281, 2012.
DOI : 10.1145/974121.974131

URL : https://hal.archives-ouvertes.fr/hal-00736945

J. Z. Kolter and M. A. Maloof, Learning to detect malicious executables in the wild, Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '04, pp.470-478, 2004.
DOI : 10.1145/1014052.1014105

G. Navarro, A guided tour to approximate string matching, ACM Computing Surveys, vol.33, issue.1, pp.31-88, 2001.
DOI : 10.1145/375360.375365

URL : http://www.dcc.uchile.cl/~gnavarro/ps/acmcs01.1.ps.gz

J. Ming, Z. Xin, P. Lan, D. Wu, P. Liu et al., Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications, The 13th International Conference on Applied Cryptography and Network Security, 2015.
DOI : 10.1007/978-3-319-28166-7_24

A. Moser, C. Kruegel, and E. Kirda, Limits of Static Analysis for Malware Detection, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.421-430, 2007.
DOI : 10.1109/ACSAC.2007.21

R. Moskovitch, I. Gus, S. Pluderman, D. Stopel, Y. Fermat et al., Host Based Intrusion Detection using Machine Learning, 2007 IEEE Intelligence and Security Informatics, pp.107-114, 2007.
DOI : 10.1109/ISI.2007.379542

URL : http://medinfo.ise.bgu.ac.il/medlab/MembersHomePages/RobPapers/Moskovitch.UMCD.ISI2007.pdf

T. Raffetseder, C. Kruegel, and E. Kirda, Detecting System Emulators, Proceedings of Information Security, 10th International Conference, pp.1-18, 2007.
DOI : 10.1007/978-3-540-75496-1_1

URL : http://www.auto.tuwien.ac.at/~chris/research/doc/isc07_detection.pdf

B. Rozenberg, E. Gudes, Y. Elovici, and Y. Fledel, Method for Detecting Unknown Malicious Executables, Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, pp.376-377, 2009.
DOI : 10.1007/978-3-642-04342-0_31

A. Somayaji and S. Forrest, Automated Response Using System-Call Delays, Proceedings of the 9th USENIX Security Symposium, pp.185-198, 2000.

Y. Sufatrio and R. H. , Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks, Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection, pp.146-164, 2005.
DOI : 10.1007/11663812_8

URL : http://www.comp.nus.edu.sg/~tslsufat/sufatrio-yap-raid05.pdf

G. Tandon and . P. Chan, ON THE LEARNING OF SYSTEM CALL ATTRIBUTES FOR HOST-BASED ANOMALY DETECTION, International Journal on Artificial Intelligence Tools, vol.15, issue.06, pp.875-892, 2006.
DOI : 10.1016/S1389-1286(00)00139-0

D. Wagner and P. Soto, Mimicry attacks on host-based intrusion detection systems, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.255-264, 2002.
DOI : 10.1145/586110.586145