6Christodorescu, M. , Jha, S. Static analysis of execut- ables to detect malicious patterns[C]//Proceedings of the 12th USENIX Security Symposium (Security'03), USENIX Association, USENIX Association, 2003. 169-186.
7Witten, I. , Frank, E. Data mining.. Practical machine learning tools and techniques with Java implementa- tions. Morgan Kaufmann, San Francisco,2000.
8Lewis, D. , & Gale, W. A sequential algorithm for training text classifiers[C]//Proceedings of the Seven- teenth Annual International ACM-SIGIR Conference on Research and Development in Information Retrieval. Springer-Verlag, 19 9 4 : 3 - 12.
9Kephart, J. O. , Sorkin, G. B. , Arnold, W. C. , et al. Biologically inspired defenses against computer viruses [C]//Proceedings of the 14th UCAI, Montreal, 1995, : 985-996.
10Arnold, W., Tesauro, G. Automatically generated win32 heuristic virus detection[C]//Proceedings of the 2000 International Virus Bulletin Conference,2000.