1. [1] J. Quinlan, "Bagging, Boosting and C4.5," 2006.
2. [2] M. Alazab, R. Layton, S. Venkataraman and P. Watters, "Malware Detection Based on Structural and Behavioural Features of API Calls," Perth, WA, 2010.
3. [3] C. T. Lin, N.-J. Wang, H. Xiao and C. Eckert, "Feature Selection and Extraction for Malware Classification," journal of Information Science and Engineering 31, vol. 31, no. 3, pp. 965-992, 2015.
4. [4] J. Xu, A. H. Sung, S. Mukkamala ,and Q. Liu, "Obfuscated Malicious Executable Scanner," Journal of Research and Practice in Information Technology, vol. 39, pp. 181-197, 2007.
5. [5] M. J. Landage and P. M.P.Wankhade, "Malware Detection with Different Voting Schemes," COMPUSOFT, An international journal of advanced computer technology, vol. 3, no. 1, pp. 450-456, 2014.
6. [6] W. Wong and M. Stamp, "Hunting for meta-morphic engines," Journal in Computer Viro-logy, vol. 2, no. 3, pp. 211-229, 2006. [
DOI:10.1007/s11416-006-0028-7]
7. [7] T. Kalbhor, "Dueling hidden Markov models for virus analysis," Journal of Computer Virology and Hacking Techniques, vol. 11, no. 2, pp. 103-118, 2015. [
DOI:10.1007/s11416-014-0232-9]
8. [8] S. Attaluri, S. McGhee and M. Stamp, "Profile hidden Markov models and metamorphic virus detection," Journal in Computer Virology, vol. 5, no. 2, pp. 151-169, 2009. [
DOI:10.1007/s11416-008-0105-1]
9. [9] C. Annachhatre and M. Stamp, "Hidden Markov models for malware classification," Journal of Computer Virology and Hacking Techniques, vol. 11, no. 2, pp. 59-73, 2015. [
DOI:10.1007/s11416-014-0215-x]
10. [10] S. Josse and E. Filiol, "New Trends in Security Evaluation of Bayesian Network-Based Mal-ware Detection Models," Maui, Hawaii USA, 2012.
11. [11] T. Singh, F. D. Troia, V. A. Corrado, T. H. Austin and M. Stamp, "Support vector machines and malware detection," Journal of Computer Virology and Hacking Techniques, vol. 12, no. 4, pp. 203-212, 2016. [
DOI:10.1007/s11416-015-0252-0]
12. [12] H.Ghaemi and M.Kahani, "Question classi-fication using ensemble classifiers," Quarterly Journal Signal and Data Processing, vol. 29, number.3, pp.99, 1395. [
DOI:10.18869/acadpub.jsdp.13.3.99]
13. [12] هادی قائمی و محسن کاهانی، "دستهبندی پرسش ها با استفاده از ترکیب دستهبندها" ، فصلنامه علمی-پژوهشی پردازش علائم و دادهها، شماره 3، پیاپی 29، صفحه 99، سال 95.
14. [13] V. Asch, "Macro- and micro-averaged evalua-tion measures [[BASIC DRAFT]]," univercity of Antwerp, 2013.
15. [14] M. Sokolova and G. Lapalme, "A systematic analysis of performance measures for classi-fication tasks," Information Processing and Management, vol. 45, pp. 427-437, 2009. [
DOI:10.1016/j.ipm.2009.03.002]