@incollection{, ADFABD956C2B2A4E750AF281FAC2F794 , author={{G. BalaKrishna} and {V.Radha} and {K. VenugopalaRao} and {KMIT/JNTUH}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1651722 } @book{b0, , title={{Attacking Malicious Code: A Report to the Infosec Research Council}} , author={{ GMcgraw } and { GMorrisett }} , year={2000} , publisher={IEEE Softw} 17 } @incollection{b1, , title={{Mechanisms of Polymorphic and Metamorphic Viruses}} , author={{ LXufang } and { PK KLoh } and { FTan }} , booktitle={{Intelligence and Security Informatics Conference (EISIC)}} , year={2011 European. 2011} } @book{b2, , title={{}} , author={{ LabMcafee }} , year={2013 Threats Predictions. 2013} } @book{b3, , title={{}} , author={{ RB SBerkenkopf } and { G-DataMalware }} , year={2010} , note={Report} } @incollection{b4, , title={{Intelligent file scoring system for malware detection from the gray list}} , author={{ YYe }} , booktitle={{Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining}} the 15th ACM SIGKDD international conference on Knowledge discovery and data miningParis, France , publisher={ACM} , year={2009} } @book{b5, , title={{Malheur A novel tool for malware analysis}} , author={{ KRieck }} , year={2012} } @incollection{b6, , title={{Improving the security level of the FUSION, multi-agent architecture}} , author={{ CIPinz }} , journal={{Expert Syst. Appl}} 39 8 , year={2012} } @incollection{b7, , title={{Malware Detection Based on Hybrid Signature Behaviour Application Programming Interface Call Graph}} , author={{ AmmarAhmed } and { EElhadi } and { MAMaarof } and { AHOsman }} , journal={{American Journal of Applied Sciences}} 9 3 , year={2012} } @incollection{b8, , title={{Metamorphic Malware Detection Using Statistical Analysis}} , author={{ PSKevadia Kaushal } and { NileshPrajapati }} , journal={{International Journal of Soft Computing and Engineering (IJSCE)}} 2 , year={2012} } @incollection{b9, , title={{MelihAbdulhayoglu, Combining file content and file relations for cloud based malware detection}} , author={{ TLYanfang Ye } and { WeiweiShenghuo Zhu } and { Zhuang } and { UmeshEgementas } and { Gupta }} , booktitle={{Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining}} the 17th ACM SIGKDD international conference on Knowledge discovery and data miningSan Diego, California, USA , publisher={ACM} , year={2011} } @incollection{b10, , title={{Semantics-Aware Malware Detection}} , author={{ MChristodorescu }} , booktitle={{Proceedings of the 2005 IEEE Symposium on Security and Privacy}} the 2005 IEEE Symposium on Security and Privacy , publisher={IEEE Computer Society} , year={2005} } @incollection{b11, , title={{Panorama: capturing systemwide information flow for malware detection and analysis}} , author={{ HYin }} , booktitle={{Proceedings of the 14th ACM conference on Computer and communications security}} the 14th ACM conference on Computer and communications securityAlexandria, Virginia, USA , publisher={ACM} , year={2007} } @incollection{b12, , title={{}} , author={{ PVinod }} , journal={{Survey on Malware Detection Methods}} , year={2009} } @book{b13, , title={{what is cloud Anti-Virus and how it does work}} , author={{ LZeltser }} } @book{b14, , title={{Stealthy malware detection through vmm-based "outof-the-box" semantic view reconstruction, in Computer and communications security}} , author={{ XJiang } and { XWang } and { DXu }} , year={2007} , publisher={ACM} , address={Alexandria, Virginia, USA} } @book{b15, , title={{Automated dynamic binary analysis}} , year={2007} } @incollection{b16, , title={{Efficient signature based malware detection on mobile devices}} , author={{ DeepakVenugopal } and { GH }} , journal={{Mob. Inf. Syst}} 4 1 , year={2008} } @incollection{b17, , title={{Effective and efficient malware detection at the end host}} , author={{ CKolbitsch }} , booktitle={{Proceedings of the 18th conference on USENIX security symposium}} the 18th conference on USENIX security symposiumMontreal, Canada , year={2009} , note={USENIX Association} } @book{b18, , title={{A Heuristic Approach for Detection of Obfuscated Malware}} , author={{ ST A MZhou }} , year={2009} , publisher={IEEE} } @incollection{b19, , title={{NIDS: A Network Based Approach to Intrusion Detection and Prevention}} , author={{ MAhmed }} , booktitle={{Computer Science and Information Technology -Spring Conference}} , year={2009. 2009} } @book{b20, , title={{A virtual machine introspection based architecture for intrusion detection}} , author={{ TGarfinkel } and { MRosenblum }} , year={2003} } @book{b21, , title={{Flexible Computing with Virtual Machines}} , author={{ HALagar-Cavilla }} , year={2009} } @book{b22, , title={{Multi-agent Peer-to-Peer Intrusion Detection Computer Network Security}} , author={{ VGorodetsky }} , year={2007} , publisher={Springer} , address={Berlin Heidelberg} } @book{b23, , title={{An Agent-Based Framework for Distributed Intrusion Detections}} , author={{ DYe }} , year={2009} } @incollection{b24, , title={{Agent-Based immunity for computer virus: abstraction from dendritic cell algorithm with danger theory}} , author={{ C. -MOu } and { CROu }} , booktitle={{Proceedings of the 5th international conference on Advances in Grid and Pervasive Computing}} the 5th international conference on Advances in Grid and Pervasive ComputingHualien, Taiwan , publisher={Springer-Verlag} , year={2010} } @incollection{b25, , title={{Intrusion detection in open peer-to-peer multi-agent systems}} , author={{ SBijani } and { DRobertson }} , booktitle={{Proceedings of the 5 th international conference on Autonomous infrastructure, management, and security: managing the dynamics of networks and services}} the 5 th international conference on Autonomous infrastructure, management, and security: managing the dynamics of networks and servicesNancy, France , publisher={Springer Verlag} , year={2011} } @incollection{b26, , title={{Research on adaptive distributed intrusion detection system model based on Multi-Agent}} , author={{ HDong }} , booktitle={{Computer Science and Automation Engineering (CSAE), 2011 IEEE International Conference on}} , year={2011} } @book{b27, , title={{Multiagent-based computer virus detection systems: abstraction from dendritic cell algorithm with danger theory}} , author={{ CMOu }} , year={2011} , publisher={Springerlink} } @book{b28, , title={{A Temporal Logic Based Approach to Multi-Agent Intrusion Detection and Prevention}} , author={{ ParitoshDas } and { RN }} , year={2012} } @incollection{b29, , title={{Limits of static analysis for malware detection}} , author={{ CMoser } and { EKruegel } and { Kirda }} , booktitle={{Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC '07)}} the 23rd Annual Computer Security Applications Conference (ACSAC '07) , year={December 2007} } @incollection{b30, , title={{Obfuscation: the hidden malware}} , author={{ POkane } and { SSezer } and { KMclaughlin }} , journal={{IEEE Security & Privacy}} 9 5 , year={2011} } @book{b31, , author={{ SCesare } and { YXiang }} , title={{Software Similarity and Classification}} , publisher={Springer Science & Business Media} , year={2012} } @incollection{b32, , title={{System call monitoring using authenticated system calls}} , author={{ MRajagopalan } and { MAHiltunen } and { TJim } and { RDSchlichting }} , journal={{IEEE Transactions on Dependable and Secure Computing}} 3 3 , year={2006} } @incollection{b33, , title={{Control-´flow integrity}} , author={{ MAbadi } and { MBudiu } and { UErlingsson } and { JLigatti }} , booktitle={{Proceedings of the 12th ACM Conference on Computer and Communications Security}} the 12th ACM Conference on Computer and Communications Security , year={November 2005} } @incollection{b34, , title={{Signature generation and detection of malware families}} , author={{ SSathyanarayan } and { PKohli } and { BBruhadeshwar }} , booktitle={{Information Security and Privacy}} Berlin, Germany , publisher={Springer} , year={2008} } @incollection{b35, , title={{Malware detection based on mining API calls}} , author={{ BSami } and { HYadegari } and { NRahimi } and { SPeiravian } and { AHashemi } and { Hamze }} , booktitle={{Proceedings of the 25th Annual ACM Symposium on Applied Computing (SAC '10)}} the 25th Annual ACM Symposium on Applied Computing (SAC '10) , publisher={ACM} , year={March 2010} } @incollection{b36, , title={{IMDS: intelligent malware detection system}} , author={{ YYe } and { DWang } and { TLi } and { DYe }} , booktitle={{Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining}} the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining , publisher={ACM} , year={August 2007} } @incollection{b37, , title={{Zeroday malware detection based on supervised learning algorithms of API call signatures}} , author={{ MAlazab } and { SVenkatraman } and { PWatters }} , booktitle={{Proceedings of the 9 th Australasian Data Mining Conference (AusDM '11)}} the 9 th Australasian Data Mining Conference (AusDM '11) , publisher={Australian Computer Society} , year={December 2011} 121 } @incollection{b38, , title={{Differentiating malware from cleanware using behavioural analysis}} , author={{ RTian } and { MRIslam } and { LBatten } and { SVersteeg }} , booktitle={{Proceedings of the 5th International Conference on Malicious and Unwanted Software (MALWARE '10)}} the 5th International Conference on Malicious and Unwanted Software (MALWARE '10)Nancy, France , year={October 2010} } @incollection{b39, , title={{Kernel machines for malware classification and similarity analysis}} , author={{ MShankarapani } and { KKancherla } and { SRamammoorthy } and { RMovva } and { SMukkamala }} , booktitle={{Proceedings of the International Joint Conference on Neural Networks (IJCNN '10)}} the International Joint Conference on Neural Networks (IJCNN '10) , year={July 2010} } @incollection{b40, , title={{Malware detection using assembly and API call sequences}} , author={{ MKShankarapani } and { SRamamoorthy } and { RSMovva } and { SMukkamala }} , journal={{Journal in Computer Virology}} 7 2 , year={2011} } @incollection{b41, , title={{Using spatiotemporal linformationin API call swithmachinelea rning algorithms for malware detection}} , author={{ FAhmed } and { HHameed } and { MZShafiq } and { MFarooq }} , booktitle={{Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence}} the 2nd ACM Workshop on Security and Artificial Intelligence , year={November 2009} } @incollection{b42, , title={{CBM: free, automatic malware analysis framework using API call sequences}} , author={{ YQiao } and { YYang } and { JHe } and { CTang } and { ZLiu }} , booktitle={{Knowledge Engineering and Management}} Berlin, Germany , publisher={Springer} , year={2014} } @incollection{b43, , title={{Analyzing malware by abstracting the frequent item sets in API call sequences}} , author={{ YQiao } and { YYang } and { LJi } and { He }} , booktitle={{Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom '13)}} the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom '13) , year={July 2013} } @incollection{b44, , title={{Static detection of malicious code in executable programs}} , author={{ JBergeron } and { MDebbabi } and { JDesharnais } and { MMErhioui } and { YLavoie } and { NTawbi }} , booktitle={{Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS '01)}} the Symposium on Requirements Engineering for Information Security (SREIS '01) , year={2001} } @incollection{b45, , title={{Malnetminer: malware classification based on social network analysis of call graph}} , author={{ J. -WJang } and { JWoo } and { JYun } and { HKKim }} , booktitle={{Proceedings of the Companion Publication of the 23rd International Conference on World Wide Web Companion (WWW Companion '14)}} the Companion Publication of the 23rd International Conference on World Wide Web Companion (WWW Companion '14) , year={2014} , note={International World Wide Web Conferences Steering Committee} } @incollection{b46, , title={{Automatic analysis of malware behavior using machine learning}} , author={{ KRieck } and { PTrinius } and { CWillems } and { THolz }} , journal={{Journal of Computer Security}} 19 4 , year={2011} } @incollection{b47, , title={{Protecting against unexpected system calls}} , author={{ CMLinn } and { MRajagopalan } and { SBaker } and { CCollberg } and { SKDebray } and { JHHartman }} , booktitle={{Proceedings of the 14th USENIX Security Symposium}} the 14th USENIX Security SymposiumBaltimore, Md, USA , year={August 2005} } @incollection{b48, , title={{Graph Based Malware Detection Using Dynamic Analysis}} , author={{ BAnderson } and { DQuist } and { JNeil } and { CStorlie } and { TLane }} 10.1007/s11416-011-0152-x , journal={{Journal in Computer Virology}} 7 , year={2011} } @incollection{b49, , title={{Scalable, Behavior-Based Malware Clustering}} , author={{ UBayer } and { PMComparetti } and { CHlauschek } and { CKruegel }} , booktitle={{Proceedings of the 16th Annual Network and Distributed System Security Symposium}} the 16th Annual Network and Distributed System Security Symposium , year={2009} } @incollection{b50, , title={{Approximate Nearest Neighbor: Towards Removing the Curse of Dimensionality}} , author={{ PIndyk } and { RMotwani }} , booktitle={{Proceedings of 30th Annual ACM Symposium on Theory of Computing}} 30th Annual ACM Symposium on Theory of ComputingDallas , year={1998. May 1998} , note={Anubis} } @incollection{b51, , title={{Automated Classification and Analysis of Internet Malware}} , author={{ MBiley } and { JOberheid } and { JAndersen } and { ZMorley Mao } and { FJahanian } and { JNazario }} 10.1007/978-3-540-74320-0_10 , booktitle={{Proceedings of the 10 th International Conference on Recent Advances in Intrusion Detection}} the 10 th International Conference on Recent Advances in Intrusion Detection , year={2007} 4637 } @incollection{b52, , title={{Fast Malware Classification by Automated Behavioral Graph Matching}} , author={{ YPark } and { DReeves } and { VMulukutla } and { BSundaravel }} , booktitle={{Proceedings of the 6th}} the 6th , year={2010} } @incollection{b53, , title={{}} , journal={{Annual Workshop on Cyber Security and Information Intelligence Research}} 45 } @incollection{b54, , title={{Analysis of Machine Learning Techniques Used in Behavior Based Malware Detection}} , author={{ IFirdausi } and { CLim } and { AErwin }} , booktitle={{Proceedings of 2nd International Conference on Advances in Computing, Control and Telecommunication Technologies (ACT)}} 2nd International Conference on Advances in Computing, Control and Telecommunication Technologies (ACT) , year={2010. Jakarta, 2-3 December 2010} } @incollection{b55, , title={{Automated Malware Classification Based on Network Behavior}} , author={{ SNari } and { AGhorbani }} , booktitle={{Proceedings of International Conference on Computing, Networking and Communications (ICNC)}} International Conference on Computing, Networking and Communications (ICNC)San Diego , year={2013. January 2013} } @incollection{b56, , title={{The WEKA Data Mining Software: An Update}} , author={{ MHall } and { EFrank } and { GHolmes } and { BPfahringer } and { PReutemann } and { IWitten }} , journal={{ACM SIGKDD Explorations Newsletter}} , year={2009} } @book{b57, , author={{ TLee } and { JJMody }} , title={{Behavioral Classification. Proceedings of the European Institute for Computer Antivirus Research Conference (EICAR'06)}} , year={2006} } @incollection{b58, , title={{OPEM: A Static-Dynamic Approach for Machine Learning Based Malware Detection}} , author={{ ISantos } and { JDevesa } and { FBrezo } and { JNieves } and { PGBringas }} , booktitle={{Proceedings of International Conference CISIS'12-ICEUTE'12, Special Sessions Advances in Intelligent Systems and Computing}} International Conference CISIS'12-ICEUTE'12, Special Sessions Advances in Intelligent Systems and Computing , year={2013} 189 } @incollection{b59, , title={{Classification of Malware Based on Integrated Static and Dynamic Features}} , author={{ RIslam } and { RTian } and { LBattenb } and { SVersteeg }} , journal={{Journal of Network and Computer Application}} 36 , year={2013} } @book{b60, , title={{}} 10.1016/j.jnca.2012.10.004 } @incollection{b61, , title={{Improving Malware Classification: Bridging the Static/Dynamic Gap}} , author={{ BAnderson } and { CStorlie } and { TLane }} , booktitle={{Proceedings of 5 th ACM Workshop on Security and Artificial Intelligence (AISec)}} 5 th ACM Workshop on Security and Artificial Intelligence (AISec) , year={2012} }