[1]
Richard Ford, Eugene H. Spafford, Happy birthday, dear viruses. Science, 2007, vol. 317: 210-211.
DOI: 10.1126/science.1140909
Google Scholar
[2]
Stephen Trilling, Carey Nachenberg. The future of malware. EICAR Proceedings 1999.
Google Scholar
[3]
Sandeep Kumar, Eugene H. Spafford. A generic virus scanner in C++. Proceedings of the 8th Computer Security Applications Conference, 1992, 210-219.
Google Scholar
[4]
Nwokedi Idika, Aditya P. Mathur. A Survey of Malware Detection Techniques. http://www.serc.net/report/tr286.pdf, February, 2007.
Google Scholar
[5]
Victor Skormin, Alexander Volynkin, Douglas Summerville, et al. In the search of the "gene of self-replication" in malicious codes. Proceedings of IEEE Workshop on Information Assurance and Security, 2005, 193-200.
DOI: 10.1109/iaw.2005.1495952
Google Scholar
[6]
V. Skormin, D. Summerville, J. Moronski. Detecting Malicious Codes by the presence of their Gene of Self-Replication, Computer Network Security, Lecture Notes in Computer Science, 2003, vol. 2776.
DOI: 10.1007/978-3-540-45215-7_16
Google Scholar
[7]
Douglas Summerville, Victor Skormin, Alexander Volynkin, et al. Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes. Lecture Notes in Computer Science, 2005, vol. 3685: 54 – 75.
DOI: 10.1007/11560326_5
Google Scholar
[8]
D. Ellis, J. Aiken, K. Attwood, and S. Tenaglia. A behavioral approach to worm detection. Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004, 43–53.
DOI: 10.1145/1029618.1029625
Google Scholar
[9]
R. Moskovitch, N. Nissim, Y. Elovici. Malicious Code Detection and Acquisition Using Active Learning. IEEE Intelligence and Security Informatics, 2007, 371 – 371.
DOI: 10.1109/isi.2007.379505
Google Scholar
[10]
Yuval Elovici, Asaf Shabtai, Robert Moskovitch, et al. Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic. Proceedings of the 30th Annual German Conference on Artificial Intelligence, 2007, 44-50.
DOI: 10.1007/978-3-540-74565-5_5
Google Scholar
[11]
J.Z. Kolter, M.A Maloof. Learning to detect malicious executables in the wild. Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2004, 470–478.
DOI: 10.1145/1014052.1014105
Google Scholar
[12]
Guojpeng/CVC.GB. The analysis of Win32 PE viruses. 2003, http://www.hynubbs.cn/netstar/news_view.asp?id=61.
Google Scholar
[13]
Sipser Michael. Introduction to the Theory of Computation, Second Edition, Boston Mass: Thomson Course Technology, 2006.
Google Scholar
[14]
VX Heavens. http://vx.netlux.org
Google Scholar
[15]
Kaspersky Lab. http://www.kaspersky.com
Google Scholar
[16]
J. Y. Xu, A. H. Sung, P. Chavez. Polymorphic malicious executable scanner by API sequence analysis. Fourth International Conference on Hybrid Intelligent Systems, 2004, 378 - 383.
DOI: 10.1109/ichis.2004.75
Google Scholar