A. , Malware statistics

A. ,

B. Blunden, The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System, 2009.

D. H. Chau, C. Nachenberg, J. Wilhelm, A. Wright, and C. Faloutsos, Polonium: Tera-scale graph mining and inference for malware detection, SIAM INTERNATIONAL CONFERENCE ON DATA MINING (SDM), pp.131-142, 2011.

. Clamav,

A. A. Elhadi, M. A. Maarof, and B. I. Barry, Improving the detection of malware behaviour using simplified data dependent api call graph, International Journal of Security and Its Applications, vol.7, issue.5, pp.29-42, 2013.

A. M. Espinoza, M. I. Al-saleh, and J. R. Crandall, Antivirus performance characterisation: system-wide view, IET Information Security, vol.7, 2013.

G. Mondoc, A. Cret¸, and O. Cret¸, Dynamic behavior evaluation for malware detection, 2017 5th International Symposium on Digital Forensic and Security (ISDFS), pp.1-6, 2017.

G. Mondoc, A. Portase, R. Cret¸, and O. Cret¸, Evasive Malware Detection Using Groups of Processes, pp.32-45, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01649019

Y. Ji, Q. Li, Y. He, and D. Guo, Overhead analysis and evaluation of approaches to host-based bot detection, International Journal of Distributed Sensor Networks, vol.11, issue.5, p.524627, 2015.

C. Kolbitsch, P. M. Comparetti, C. Kruegel, E. Kirda, X. Zhou et al., Effective and efficient malware detection at the end host, Proceedings of the 18th Conference on USENIX Security Symposium, pp.351-366, 2009.

D. Mircescu, Systems and methods for using a reputation indicator to facilitate malware scanning, US Patent, vol.9, p.77, 2015.

Z. Ramzan, V. Seshadri, and C. Nachenberg, Reputation-based security an analysis of real world effectiveness

S. Shin, Z. Xu, and G. Gu, Effort: A new host-network cooperated framework for efficient and effective bot malware detection, Comput. Netw, vol.57, issue.13, 2013.

A. Tamersoy, K. Roundy, and D. H. Chau, Guilt by association: Large scale malware detection by mining file-relation graphs, Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, vol.14, pp.1524-1533, 2014.

D. Uluski, M. Moffie, and D. Kaeli, Characterizing antivirus workload execution, vol.33, pp.90-98, 2005.

G. Vasiliadis and S. Ioannidis, GrAVity: A Massively Parallel Antivirus Engine, pp.79-96, 2010.

H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda, Panorama: Capturing systemwide information flow for malware detection and analysis, Proceedings of the 14th ACM Conference on Computer and Communications Security, pp.116-127, 2007.