B. Blunden, The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System, 2013.

L. Buitinck, G. Louppe, M. Blondel, F. Pedregosa, A. Mueller et al., API design for machine learning software: Experiences from the scikit-learn Project, Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases Workshop: Languages for Data Mining and Machine Learning, pp.108-122, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00856511

M. Christodorescu, S. Jha, S. Seshia, D. Song, and R. Bryant, Semantics-Aware Malware Detection, 2005 IEEE Symposium on Security and Privacy (S&P'05), pp.32-46, 2005.
DOI : 10.1109/SP.2005.20

URL : http://repository.cmu.edu/cgi/viewcontent.cgi?article=1031&context=ece

B. Dolan-gavitt, A. Srivastava, P. Traynor, and J. Giffin, Robust signatures for kernel data structures, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.566-577, 2009.
DOI : 10.1145/1653662.1653730

URL : http://www.cc.gatech.edu/%7Ebrendan/ccs09_siggen.pdf

H. Galal, Y. Mahdy, and M. Atiea, Behavior-based features model for malware detection, Journal of Computer Virology and Hacking Techniques, vol.14, issue.3, pp.59-67, 2016.
DOI : 10.1023/A:1010933404324

T. Ho, The random subspace method for constructing decision forests, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.20, issue.8, pp.832-844, 1998.

G. Hoglund and J. Butler, Rootkits: Subverting the Windows Kernel, Pearson Education, Upper Saddle River, 2006.

T. Hungenberg and M. Eckert, INetSim: Internet Services Simulation Suite (www.inetsim.org), 2007.

B. Klein and R. Peters, Defeating machine learning ? What your security vendor is not telling you

M. Ligh, A. Case, J. Levy, and A. Walters, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux and Mac Memory, 2014.

Y. Lin, Y. Lai, C. Lu, P. Hsu, and C. Lee, Three-phase behaviorbased detection and classification of known and unknown malware, 2004.

C. Manning, P. Raghavan, and H. Schutze, An Introduction to Information Retrieval, 2008.
DOI : 10.1017/CBO9780511809071

Z. Markel and M. Bilzor, Building a machine learning classifier for malware detection, 2014 Second Workshop on Anti-malware Testing Research (WATeR), 2014.
DOI : 10.1109/WATeR.2014.7015757

M. Masud, S. Sahib, M. Abdollah, S. Selamat, and R. Yusof, Analysis of Features Selection and Machine Learning Classifier in Android Malware Detection, 2014 International Conference on Information Science & Applications (ICISA), 2014.
DOI : 10.1109/ICISA.2014.6847364

A. Mohaisen, O. Alrawi, and M. Mohaisen, AMAL: High-fidelity, behavior-based automated malware analysis and classification, Computers & Security, vol.52, pp.251-266, 2015.
DOI : 10.1016/j.cose.2015.04.001

R. Mosli, R. Li, B. Yuan, and Y. Pan, Automated malware detection using artifacts in forensic memory images, 2016 IEEE Symposium on Technologies for Homeland Security (HST), 2016.
DOI : 10.1109/THS.2016.7568881

H. Nath and B. Mehtre, Static Malware Analysis Using Machine Learning Methods, Proceedings of the Second International Conference on Recent Trends in Computer Networks and Distributed Systems Security, pp.440-450, 2014.
DOI : 10.1007/978-3-642-54525-2_39

S. Naval, V. Laxmi, M. Rajarajan, M. Gaur, and M. Conti, Employing Program Semantics for Malware Detection, IEEE Transactions on Information Forensics and Security, vol.10, issue.12, pp.2591-2604, 2015.
DOI : 10.1109/TIFS.2015.2469253

URL : http://openaccess.city.ac.uk/12313/1/TIFS-Smita.pdf

Y. Park, D. Reeves, and M. Stamp, Deriving common malware behavior through graph clustering, Computers & Security, vol.39, pp.419-430, 2013.
DOI : 10.1016/j.cose.2013.09.006

R. Pirscoveanu, S. Hansen, T. Larsen, M. Stevanovic, J. Pedersen et al., Analysis of Malware behavior: Type classification using machine learning, 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015.
DOI : 10.1109/CyberSA.2015.7166115

J. Roberts, VirusShare Project (virusshare.com), 2017.

M. Russinovich, Pushing the limits of Windows: Handles, Mark's Blog (blogs.technet.microsoft.com/markrussinovich, 2009.

I. Santos, F. Brezo, X. Ugarte-pedrero, and P. Bringas, Opcode sequences as representation of executables for data-mining-based unknown malware detection, Information Sciences, vol.231, pp.64-82, 2013.
DOI : 10.1016/j.ins.2011.08.020

J. Saxe and K. Berlin, Deep neural network based malware detection using two dimensional binary program features, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), pp.11-20, 2015.
DOI : 10.1109/MALWARE.2015.7413680

URL : http://arxiv.org/pdf/1508.03096

A. Schuster, Enumerate Object Types Computer Forensic Blog (computer.forensikblog, 2009.

J. Stuttgen and M. Cohen, Anti-forensic resilient memory acquisition, Digital Investigation, pp.105-115, 2013.
DOI : 10.1016/j.diin.2013.06.012

T. Teller and A. Hayon, Enhancing automated malware analysis machines with memory analysis, presented at Black Hat USA, 2014.

A. Zaki and B. Humphrey, Unveiling the kernel: Rootkit discovery using selective automated kernel memory differencing, presented at the Virus Bulletin Conference, 2014.