5Kolter J z, Maloof M A. Learning to detect and classify malicious executables in the wild[J]. The Journal of Machine Learning Research, 2006,( 7): 2721-2744.
6Gao D, Reiter M K, Song D. Binhunt: Automatically finding semantic differences in binary programs[M]. Heidelberg: Springer Berlin, 2008.
7Chen Q Z, Cheng 1K, Gu YJ. Classification algorithms of Trojan horse detection based on behavior[C] International Conference on IEEE, 2009, (2): 510-513.
8liu Yu feng, Zhang Li-wei, Liang Jian, et al. Detecting trojan horses based on system behavior using machine learning method[C]// Proceedings of the Ninth International Conference on Machine Learning and Cybernetics, Qingdao, 2010,(7):11-14.
9Bayer U, Comparetti P M, Hlauschek C, et al. Scalable, Behavior- Based Malware Clustering[C]//NDSS. 2009, (9): 8-11.
10Kirda E, Kruegel C, Banks G, et al. Behavior-based Spyware Detection[C] Usenix Security,2006.