IEEE Annals of the History of Computing, Volumes 27–28. IEEE Computer Society, 2005. 74Lưu trữ ngày 13 tháng 5 năm 2016 tại Wayback Machine: "[...]from one machine to another led to experimentation with the Creeper program, which became the world's first computer worm: a computation that used the network to recreate itself on another node, and spread from node to node."
Firdausi, Ivan; Lim, Charles; Erwin, Alva; Nugroho, Anto Satriyo (2010). "Analysis of Machine learning Techniques Used in Behavior-Based Malware Detection". 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies. tr. 201. doi:10.1109/ACT.2010.33. ISBN978-1-4244-8746-2. S2CID18522498.
Siddiqui, Muazzam; Wang, Morgan C.; Lee, Joohan (2008). "A survey of data mining techniques for malware detection using file features". Proceedings of the 46th Annual Southeast Regional Conference on XX – ACM-SE 46. tr. 509. doi:10.1145/1593105.1593239. ISBN9781605581057. S2CID729418.
Komashinskiy, Dmitriy; Kotenko, Igor (2010). "Malware Detection by Data Mining Techniques Based on Positionally Dependent Features". 2010 18th Euromicro Conference on Parallel, Distributed and Network-based Processing. tr. 617. doi:10.1109/PDP.2010.30. ISBN978-1-4244-5672-7. S2CID314909.
Ye, Yanfang; Wang, Dingding; Li, Tao; Ye, Dongyi (2007). "IMDS". Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining – KDD '07. tr. 1043. doi:10.1145/1281192.1281308. ISBN9781595936097. S2CID8142630.
Tabish, S. Momina; Shafiq, M. Zubair; Farooq, Muddassar (2009). "Malware detection using statistical analysis of byte-level file content". Proceedings of the ACM SIGKDD Workshop on Cyber Security and Intelligence Informatics – CSI-KDD '09. tr. 23. CiteSeerX10.1.1.466.5074. doi:10.1145/1599272.1599278. ISBN9781605586694. S2CID10661197.
Sami, Ashkan; Yadegari, Babak; Peiravian, Naser; Hashemi, Sattar; Hamze, Ali (2010). "Malware detection based on mining API calls". Proceedings of the 2010 ACM Symposium on Applied Computing – SAC '10. tr. 1020. doi:10.1145/1774088.1774303. ISBN9781605586397. S2CID9330550.
Shabtai, Asaf; Kanonov, Uri; Elovici, Yuval; Glezer, Chanan; Weiss, Yael (2011). ""Andromaly": A behavioral malware detection framework for android devices". Journal of Intelligent Information Systems. 38: 161. doi:10.1007/s10844-010-0148-x. S2CID6993130.
eicar.org
"About EICAR". EICAR official website. Bản gốc lưu trữ ngày 14 tháng 6 năm 2018. Truy cập ngày 28 tháng 10 năm 2013.
Tabish, S. Momina; Shafiq, M. Zubair; Farooq, Muddassar (2009). "Malware detection using statistical analysis of byte-level file content". Proceedings of the ACM SIGKDD Workshop on Cyber Security and Intelligence Informatics – CSI-KDD '09. tr. 23. CiteSeerX10.1.1.466.5074. doi:10.1145/1599272.1599278. ISBN9781605586694. S2CID10661197.
Firdausi, Ivan; Lim, Charles; Erwin, Alva; Nugroho, Anto Satriyo (2010). "Analysis of Machine learning Techniques Used in Behavior-Based Malware Detection". 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies. tr. 201. doi:10.1109/ACT.2010.33. ISBN978-1-4244-8746-2. S2CID18522498.
Siddiqui, Muazzam; Wang, Morgan C.; Lee, Joohan (2008). "A survey of data mining techniques for malware detection using file features". Proceedings of the 46th Annual Southeast Regional Conference on XX – ACM-SE 46. tr. 509. doi:10.1145/1593105.1593239. ISBN9781605581057. S2CID729418.
Komashinskiy, Dmitriy; Kotenko, Igor (2010). "Malware Detection by Data Mining Techniques Based on Positionally Dependent Features". 2010 18th Euromicro Conference on Parallel, Distributed and Network-based Processing. tr. 617. doi:10.1109/PDP.2010.30. ISBN978-1-4244-5672-7. S2CID314909.
Ye, Yanfang; Wang, Dingding; Li, Tao; Ye, Dongyi (2007). "IMDS". Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining – KDD '07. tr. 1043. doi:10.1145/1281192.1281308. ISBN9781595936097. S2CID8142630.
Tabish, S. Momina; Shafiq, M. Zubair; Farooq, Muddassar (2009). "Malware detection using statistical analysis of byte-level file content". Proceedings of the ACM SIGKDD Workshop on Cyber Security and Intelligence Informatics – CSI-KDD '09. tr. 23. CiteSeerX10.1.1.466.5074. doi:10.1145/1599272.1599278. ISBN9781605586694. S2CID10661197.
Sami, Ashkan; Yadegari, Babak; Peiravian, Naser; Hashemi, Sattar; Hamze, Ali (2010). "Malware detection based on mining API calls". Proceedings of the 2010 ACM Symposium on Applied Computing – SAC '10. tr. 1020. doi:10.1145/1774088.1774303. ISBN9781605586397. S2CID9330550.
Shabtai, Asaf; Kanonov, Uri; Elovici, Yuval; Glezer, Chanan; Weiss, Yael (2011). ""Andromaly": A behavioral malware detection framework for android devices". Journal of Intelligent Information Systems. 38: 161. doi:10.1007/s10844-010-0148-x. S2CID6993130.
IEEE Annals of the History of Computing, Volumes 27–28. IEEE Computer Society, 2005. 74Lưu trữ ngày 13 tháng 5 năm 2016 tại Wayback Machine: "[...]from one machine to another led to experimentation with the Creeper program, which became the world's first computer worm: a computation that used the network to recreate itself on another node, and spread from node to node."