3Kolter J z, Maloof M A. Learning to detect and classify malicious executables in the wild[J]. The Journal of Machine Learning Research, 2006,( 7): 2721-2744.
4Gao D, Reiter M K, Song D. Binhunt: Automatically finding semantic differences in binary programs[M]. Heidelberg: Springer Berlin, 2008.
5Chen Q Z, Cheng 1K, Gu YJ. Classification algorithms of Trojan horse detection based on behavior[C] International Conference on IEEE, 2009, (2): 510-513.
6liu Yu feng, Zhang Li-wei, Liang Jian, et al. Detecting trojan horses based on system behavior using machine learning method[C]// Proceedings of the Ninth International Conference on Machine Learning and Cybernetics, Qingdao, 2010,(7):11-14.
7Bayer U, Comparetti P M, Hlauschek C, et al. Scalable, Behavior- Based Malware Clustering[C]//NDSS. 2009, (9): 8-11.
8Kirda E, Kruegel C, Banks G, et al. Behavior-based Spyware Detection[C] Usenix Security,2006.
9Qin J, "Fan H, Si Q, et al. A Trojan horse Detection Technology Based on Behavior Analysis[C]//Proceedings of Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International Conference on,2010: 1-4.
10Valenti S, Rossi D, Dainotti A, et al. Reviewing traffic classification[M]. Heidelberg: Springer Berlin ,2013.