Lin Ying, 2010, Third International Symposium on Intelligent Information Technology and Security Informatics
Jiang Liu, 2012, International Conference on Control Engineering and Communication Technology
Kim Yong-Ho, 2014, Multimedia Tools and Applications, 71, 685, 10.1007/s11042-012-1275-x
Le Duc, 2020, International Journal of Network Management
Zimba Aaron, 2012, International Journal on Information Technologies & Security, 2, 57
Cuckoo Sandbox — Automated Malware Analysis, home page;
https://cuckoosandbox.org/ accessed March 2021
Dog Spike, 2016, IEEE International Conference on Computer Communication and Networks
Mansfield-Devine Steve, 2017, Computer Fraud & Security
Gazet Alexandre, 2010, Journal of Computer Virology, 6, 77, 10.1007/s11416-008-0092-2
Moussaileb Routa, 2019, International Symposium on Foundations and Practice of Security
Anumol ET, 2015, Intelligent Computing, Communication and Devices, 231, 10.1007/978-81-322-2012-1_24
Menon Rakesh, 2015, Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India (CSI)
Oliner Adam, 2015, Communications of the ACM, 55, 55, 10.1145/2076450.2076466
Krizak Paul, 2010, LISA ‘10: 24th Large Installation System Administration Conference
Rajan Sheena, 2020, International Conference on Innovative Computing & Communications
Mallissery Sanoop, 2011, International Conference on Computational Intelligence and Information Technology, 662, 10.1007/978-3-642-25734-6_114
NiranjanRaja M Siva, 2017, Procedia Computer Science, 115, 580, 10.1016/j.procs.2017.09.117
Bilge Leyla, 2012, 28th Annual Computer Security Applications Conference
Murphey Rich, 2010, Digital Investigation, 4, 92, 10.1016/j.diin.2007.06.012
Kim Ikkyun, 2009, International Conference on Advanced Communication Technology
Patel Reshma, 2011, International Conference on Computer Communication and Networks, 79