[1] Y. Ye, D. Wang, T. Li, D. Ye and Q. Jiang, “An intelligent PE-malware detection system based on association mining”, Springer journal in computer virology, 2008, France, pp.323-334.
[2] U. Bayer, P. Milani Comparetti, C. Hlauschek, C. Kruegel and E. Kirda, “Scalable, Behavior-Based Malware Clustering”. 16th Annual Network and Distributed System Security Symposium (NDSS) San Diego, CA, 2009.
[3] J. Wilander and P. Fak, “Pattern Matching Security Properties of Code using Dependence Graphs”, First International Workshop on Code Based Software Security Assessments (CoBaSSA 2005), Pittsburgh, Pennsylvania, USA, pp. 5 - 8.
[4] Matthias Tichy “A Master Level Course on Modeling Self-Adaptive Systems with Graph Transformations”Organic Computing, Department of Computer Science University of Augsburg, Augsburg, Germany 2010.
[5] M. Alazab, S. Venkataraman and P. Watters, "Towards Understanding Malware Behaviour by the Extraction of API Calls", Second Cybercrime and Trustworthy Computing Workshop, 2010, Ballarat, Victoria, Australia, pp.52-59.
[6] Omer Sezgin U gurlu "STEALTH SANDBOX ANALYSIS OF MALWARE" a thesis submitted to the department of computer engineering and the institute of engineering and science of bilkent university in partial fulfillment of the requirements for the degree of master of science, 2009.
[7] Kang, M.g., Yin, H., Hanna, S., McCamant, S., Song, D., "Emulating Emulation-Resistant Malware", In Proceedings of the Workshop on Virtual Machine Security (VMSec), 2009
[8] Oyama, Y., Onoue, K., Yonezawa, A., “Speculative Security Checks in Sandboxing Systems”, in Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, April 2005
[9] Sun, M-K., Lin, M-J., Liah, Ch-S., Lin, H-T., “Malware Virtialization-Resistant Behavior Dtection”, IEEE, 17th International Conference on Parallel and Distributed Systems, 2011.
[10] Ferrie, P., “Attacks on virtual machine emulators”, Symantec Security Response, December, 2006.
[11] Salehi, Z., Ghiasi, M., Sami, A., “A Miner for Malware Detection Based on API Function Calls and Their Arguments”, IEEE 16th CSI International Symposium on Artificial Intelligence and Signal Processing, 2012.
[12]Tao Ma, Shaukat Ali, Tao Yue “Modeling foundations for executable model-based testing of self healing Cyber-physical systems”,Springer Verlag Gmbh Germany 2018.
[13]Fatma Kachi, Chafia Bouanaka “A hybrid model for effivient decision making in self adaptive systems” Elsevier Information and Software Technology 2023.
[14]علیرضایی، ا.، فروزیده ، ن.، "تحلیل رفتاری کدهای بداندیش"، پایاننامه کارشناسی ارشد، دانشکده مهندسی کامپیوتر، پردیس کیش دانشگاه تهران، 1390.
[15]محمدمهدی عمادی کوچک ، بیژن ساعدی، مهدی نجف زاده ، حمید محسنی "ارائه معماری نوین شبکههای دفاعی گسترده مستحکم در برابر حملات هدفمند"، فصلنامه علمی- پژوهشی فرماندهی و کنترل،.1400
[16]Prasannjeet Singh, Mehdi Saman Azari,Francesco Vitale,Francesco Flammini “Using log analytics and process mining to enable self-healing in the Internet of Things” Springer 2022