[1] M. Egele, T. Scholte, E. Kirda, and C. Kruegel, “A Survey on Automated Dynamic Malware-analysis Techniques and Tools,” ACM Comput. Surv., vol. 44, no. 2, pp. 1-42, 2012.
[2] R. Samani, C. Beek, and L. Scientist, “McAfee Labs Threats Report,” August 2019.
[3] O. Aslan and R. Samet, “A Comprehensive Review on Malware Detection Approaches,” IEEE Access, vol. 8. pp. 6249–6271, 2020.
[4] A. Mohanta, A. Saldanha, A. Mohanta, and A. Saldanha, Antivirus Engines, , A Comprehensive Approach to Detect and Analyze Modern Malware: 1st ed.Edition. Apress , 2020.
[5] P. A. Puranik, “Static Malware Detection using Deep Neural Networks on Portable Executables,” August. 2019.
[6] “YARA Project, 2019;” [Online]. Available: https://en.wikipedia.org/wiki/Yara_International.
[7] “NSRL, 2018;” [Online]. Available: https://www.nist.gov/itl/ssd/software-quality-group/national-software-reference-library-nsrl.
[8] K. Raman, “Selecting Features to Classify Malware,” InfoSec Southwest 2012, pp. 1–5, 2012.
[9] P. V. Shijo and A. Salim, “Integrated Static and Dynamic Analysis for Malware Detection,” Procedia Computer Science, vol. 46, pp. 804–811, 2015.
[10] Z. Salehi, A. Sami, and M. Ghiasi, “MAAR: Robust Features to Detect Malicious Activity Based on API Calls, their Arguments and Return Values,” Engineering Applications of Artificial Intelligence, vol. 59. pp. 93–102, 2017.
[11] Y. Fan, Y. Ye, and L. Chen, “Malicious Sequential Pattern Mining for Automatic Malware Detection,” Expert Syst. Appl., vol. 52, pp. 16–25, 2016.
[12] A. Susanto and A. Z. A. Munawar, “AHMDS: Advanced Hybrid Malware Detector System,” Proc. 2016 Int. Conf. Data Softw. Eng. ICoDSE, 2017.
[13] S. S. Hansen, T. M. T. Larsen, M. Stevanovic, and J. M. Pedersen, “An Approach for Detection and Family Classification of Malware Based on Behavioral Analysis,” 2016 Int. Conf. Comput. Netw. Commun. ICNC 2016, 2016.
[14] H. S. Galal, Y. B. Mahdy, and M. A. Atiea, “Behavior-Based Features Model for Malware Detection,” J. Comput. Virol. Hacking Tech., vol. 12, no. 2, pp. 59–67, 2016.
[15] J. Yonts, “Attributes of Malicious Files,” sans institute, 2012.