Chi-squared distance and metamorphic virus detection Annie H. TodericiMark Stamp Original Paper 13 September 2012 Pages: 1 - 14
Static vulnerability detection in Java service-oriented components François GoichonGuillaume SalagnacStéphane Frénot Original Paper 18 October 2012 Pages: 15 - 26
Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the ‘cloud’—a forensic computing perspective Vlasti BroucekPaul Turner Original Paper 30 September 2012 Pages: 27 - 33
A similarity metric method of obfuscated malware using function-call graph Ming XuLingfei WuNing Zheng Original Paper 22 January 2013 Pages: 35 - 47