References

References


1. Chamorro, Eugene, Jianchao Han, and Mohsen Beheshti. “The design and implementation of an antivirus software advising system.” 2012 Ninth International Conference on Information Technology-New Generations. IEEE, 2012.


2. Alazab, Mamoun, et al. “Cybercrime: the case of obfuscated malware.” Global Security,Safety and Sustainability e-Democracy. Springer, Berlin, Heidelberg, 2011. 204 211.


3. Baquiran, M., and D. Wren. “Document: Webroot Secure Anywhere Cloud Antivirus vs. Six Competitor Antivirus Products (August 2014).” (2014).


4. Milletary, Jason. “Citadel trojan malware analysis.” Luettavissa: http://botnetlegalnotice. com/citadel/files/Patel_Decl_Ex20. pdf. Luettu 13 (2012): 2014


5. Nachenberg, Carey, and Peter Szor. “Selective detection of malicious computer code.” U.S. Patent No. 7,337,471. 26 Feb. 2008.


6. Mirza, Qublai KA. A Cloud-Based Intelligent and Energy Efficient Malware Detection Framework. A Framework for Cloud-Based, Energy Efficient, and Reliable Malware Detection in Real-Time Based on Training SVM, Decision Tree, and Boosting using Specified Heuristics Anomalies of Portable Executable Files. Diss. University of Bradford, 2017.


7. Geer, David. “Behavior-based network security goes mainstream.” Computer 39.3 (2006):14-17.


8. Mohurle, Savita, and Manisha Patil. “A brief study of wanna cry threat: Ransomware attack 2017.” International Journal of Advanced Research in Computer Science 8.5 (2017).


9.Chen, Qian, and Robert A. Bridges. “Automated behavioural analysis of malware: A case study of wanna cry ransomware.” 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, 2017.


10. https://us.norton.com/


11. https://www.criticthoughts.com/security/bitdefender-total-security-review/


12. https://www.webroot.com/blog/2016/02/04/threat-intelligence-an-overview/


13. https://www.ninjarmm.com/blog/ninjarmm-and-webroot-integration-reveal/

Scroll to top