Jonas Magazinius; Billy K. Rios; Andrei Sabelfeld (2013-11-04). "Polyglots". Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13. pp. 753–764. doi:10.1145/2508859.2516685. ISBN9781450324779. S2CID16516484. Archived from the original on 5 September 2022. Retrieved 5 September 2022.
Jonas Magazinius; Billy K. Rios; Andrei Sabelfeld (2013-11-04). "Polyglots". Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13. pp. 753–764. doi:10.1145/2508859.2516685. ISBN9781450324779. S2CID16516484. Archived from the original on 5 September 2022. Retrieved 5 September 2022.
dx.doi.org
Bridges, Robert A.; Oesch, Sean; Verma, Miki E.; Iannacone, Michael D.; Huffer, Kelly M. T.; Jewell, Brian; Nichols, Jeff A.; Weber, Brian et al. (2023). "Beyond the Hype: An Evaluation of Commercially Available Machine-Learning-Based Malware Detectors". Digital Threats: Research and Practice4 (2): 1–22. doi:10.1145/3567432.
Jonas Magazinius; Billy K. Rios; Andrei Sabelfeld (2013-11-04). "Polyglots". Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13. pp. 753–764. doi:10.1145/2508859.2516685. ISBN9781450324779. S2CID16516484. Archived from the original on 5 September 2022. Retrieved 5 September 2022.
Jonas Magazinius; Billy K. Rios; Andrei Sabelfeld (2013-11-04). "Polyglots". Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13. pp. 753–764. doi:10.1145/2508859.2516685. ISBN9781450324779. S2CID16516484. Archived from the original on 5 September 2022. Retrieved 5 September 2022.