[1]吳朝相, “一切從”殼”開始”, http://www.pediy.com/TUTORIAL/CHAP8/Chap8-2.htm, 1999
[2]李武鉦, 郭明達, “以Java 3D製作環場影像播放器”, 中國機械工程學會第十八屆全國學術研討會, 2001
[3]林修遠,”電腦病毒於3D電腦動畫視覺化之研究”,中原大學 商業設計研究所,2003。[4]劉得民,”木馬後門模擬程式CTP”,http://www.DiamondinfTech.com.tw:9000/TCP.zip,2004。
[5]劉得民,”簡易文字編輯程式S-Pad”,http://www.DiamondInfoTech.com.tw:9000/S-Pad.zip,2005。
[6]劉得民,”學術實驗用途之木馬測試程式”,http://www.DiamondInfoTech.com.tw:9000/RTP.zip,2006。
[7]劉得民,”kavo與變種USB病毒”,http://www.DiamondInfoTech.com.tw:9000/Kavo.zip,2007。
[8]A. Moser, C. Kruegel, and E. Kirda, “Exploring Multiple Execution Paths for Malware Analysis.”, Proceedings of the 2007 IEEE Symposium on Security and Privacy, May 2008
[9]Andrea Lanzi, Lorenzo Martignoni, Mattia Monga, and Roberto Paleari., “A smart fuzzer for x86 executables.” SESS ’07: Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007, pages 7
[10]Baoquan Chen, Arie Kaufman, “3D Volume Rotation Using Shear Transformations”, Graph. Models 62,2000 , pages. 308-322.
[11]C. Kruegel, D. Mutz, F. Valeur, and G. Vigna, “On the detection of anomalous system call arguments,” Proc. of the 8th European Symposium on Research in Computer Security (ESORICS ’03), Gjovik, Norway, October 2003, pages. 326-343.
[12]C. Kruegel, W. Robertson, and G. Vigna. , “Detecting kernel-level rootkits through binary analysis.”, the 20th Annual Computer Security Applications Conference (ACSAC’04), 2004
[13]Christian Kreibich and Jon Crowcroft., “Honeycomb - creating intrusion detection signatures using honeypots.”, the Second Workshop on Hot Topics in Networks (HotNets-II), November 2003.
[14]Christodorescu M., Jha S., Seshia S.A., Song D., Bryant R.E., “Semantics-aware malware detection”, the 2005 IEEE Symposium on Security and Privacy, 2005, pages. 32-46
[15]Christopher K., Engin K., Darren M., William R. & Giovanni V., “Polymorphic Worm Detection Using Structural Information of Executables”, Recent Advances in Intrusion Detection, Volume 3858/2006 , 2006, pages. 207-226
[16]Cohen, F., "Computer Viruses.", PhD thesis, University of Southern California, 1985
[17]D.M. Chess and S.R. White., "An undetectable computer virus.", Virus Bulletin Conference, 2000
[18]Danilo Bruschi, Lorenzo Martignoni, and Mattia Monga., “Using code normalization for fighting self-mutating malware.”, Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment., IEEE Computer Society, 2006.
[19]Eric Filiol, “Strong Cryptography Armoured Computer Viruses Forbidding Code Analysis: The Bradley Virus”, the 14th EICAR Conference, 2005
[20]Filiol, E., “Malware Pattern Scanning Schemes Secure Against Black-box Analysis” Journal in Computer Virology, Volume 2, Number 1, 2006, pages. 35-50
[21]Fred Cohen, "Computer Viruses: Theory and Experiments", Computers and Security 6 ,1987, pages.22-35.
[22]G. Serazzi and S. Zanero., "Computer virus propagation models.", the 11th IEEE/ACM Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems MASCOTS, 2003
[23]G. Vigna, “Static Disassembly and Code Analysis in Malware Detection”, Advances in Information Security, Springer Link, 2007, pages.19-41
[24]Heng Yin, Dawn Song, Egele Manuel, Christopher Kruegel, and Engin Kirda., “Panorama: Capturing systemwide information flow for malware detection and analysis.”, Proceedings of the 14th ACM Conferences on Computer and Communication Security (CCS’07), October 2007.
[25]Hethcote, H.W., "The mathematics of infectious diseases.", SIAM, 2000, pages.599-653
[26]http://en.wikipedia.org/wiki/Bionics
[27]http://lib3ds.sourceforge.net
[28]http://msdn.microsoft.com/en-us/magazine/cc301805.aspx
[29]http://research.microsoft.com/projects/invisible/include/loaders/pe_image.h.htm
[30]http://sourceforge.net/projects/upxer/
[31]http://support.microsoft.com/kb/121460/zh-tw
[32]http://tw.trendmicro.com/tw/threats/enterprise/glossary/m/malware/index.php
[33]http://upx.sourceforge.net/
[34]http://usa.autodesk.com/adsk/servlet/index?id=5659302&siteID=123112
[35]http://usa.autodesk.com/adsk/servlet/index?siteID=123112&id=7635018
[36]“Oxford dictionary”,http://www.askoxford.com ,(Last visited 2008-08-07)
[37]http://www.autodesk.com/3ds-max
[38]http://www.genesis3d.com/
[39]http://www.hex-rays.com/idapro/
[40]http://www.mcafee.com/us/local_content/white_papers/partners/
ds_wp_telconote.pdf, pages 4
[41]http://www.microsoft.com/downloads/details.aspx?
familyid=9226A611-62FE-4F61-ABA1-914185249413&displaylang=en
[42]http://www.microsoft.com/express/samples/gamecreators/Default.aspx
[43]http://www.microsoft.com/msj/0297/hood/hood0297.aspx, http://research.microsoft.com/projects/invisible/include/loaders/pe_image.h.htm
[44]http://www.symantec.com/zh/tw/business/security_response/glossary.jsp#m
[45]http://www.tsrevolution.com/
[46]http://www.viruslist.com/en/viruses/glossary?glossid=189267896
[47]http://www.viruslist.com/en/virusesdescribed
[48]https://sourceforge.net/projects/freesg/
[49]https://sourceforge.net/projects/osmosis-project/
[50]Hyang-Ah Kim and Brad Karp., “Autograph: toward automated, distributed worm signature detection.”, the 13th USENIX Security Symposium, August 2004.
[51]J. Swets and R. Pickett., “Evaluation of diagnostic systems: Methods from signal detection theory.”, Academic Press, New York, 1982.
[52]J. Z. Kolter and M. A. Maloof, “Learning to detect malicious executables in the wild” the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2004, pages. 470-478
[53]Jedidiah R. Crandall, Zhendong Su, S. Felix Wu, and Frederic T. Chong, “On Deriving Unknown Vulnerabilities from ZeroDay Polymorphic and Metamorphic Worm Exploits”, the 12th ACM Conference on Computer and Communications Security, 2005
[54]Jessica Lauren Banks., “Design and Control of an Anthropomorphic Robotic Finger with Multi-point Tactile Sensation”, Master Thesis, Massachusetts Institute of Technology, 2001, pages. 14
[55]Jim Pitts, Martin van Velsen & Robin Fercoq, “3D-Studio File Format (.3ds)”, http://www.stevemorley.com/hobbies/3d/files/3ds093.txt
[56]Jinwook Shin and Diana F. Spears. ”The basic building blocks of malware”, Technical report, University of Wyoming, http://www.cs.uwyo.edu/dspears/papers/bbb.pdf, 2006. Accessed 08/03/2008.
[57]Johan Sandin, “An Overview of Malware Protection Approaches on Client Computers”, Master Thesis, Department of Computer and Systems Sciences, Stockholm University / Royal Institute of Technology, 2005, pages.5-18
[58]John Heasman, "Implementing and Detecting a PCI Rootkit", An NGSSoftware Insight Security Research (NISR) Publication, 2006
[59]Joseph Rabaiotti , “Malware Detection using Structural and Behavioural Features and Machine Learning”, PhD. Thesis, School of Computer Science, Cardiff University, August 4, 2007
[60]Joseph Rabaiotti, “Counter Intrusion Software, Malware Detection using Structural and Behavioural Features and Machine Learning”, School of Computer Science, Cardiff University, 2007
[61]Kirtesh Patil,” Evaluation of Semantic Aware Malware Detection against Code Obfuscation Techniques”, http://www4.ncsu.edu/~kpatil/CSC743%20Paper.pdf, May 6, 2007
[62]Klaus Brunnstein, “From AntiVirus to AntiMalware Software and Beyond: Another Approach to the Protection of Customers from Dysfunctional Behaviour”, the 22nd National Information Systems Security Conference, 1999
[63]Kolter J.Z. and Maloof M.A., “Learning to detect malicious executables in the wild.” Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, ACM Press. , 2004, pages. 470-478
[64]Lee, T., Mody, J.J., “Behavioral classification”,: Proceedings of EICAR 2006 (April 2006)
[65]M. Christodorescu, J. Kinder, S. Jha, S. Katzenbeisser, and H. Veith. “ Malware normalization. Technical Report 1539”, University of Wisconsin, Madison, Wisconsin, USA, Nov. 2005
[66]M.G. Schultz, E.Eskin, E. Zadok, “Data Mining Methods for Detection of New Malicious Executables” the Security and Privacy of IEEE Symposium on, 2001, pages 38-49
[67]Marko Helenius, “A system to support the Analysis of Antivirus Products' Virus Detection Capabilities”, 2002
[68]Masud M. M., Khan L., & Thuraisingham B., “A hybrid model to detect malicious executables.” Proc. of the IEEE international conference on communication, 2007, pages.1443-1448
[69]Mila D.D., Mihai C., Somesh J., Saumya D., “A semantics-based approach to malware detection”, Annual Symposium on Principles of Programming Languages, 2007, pages.377-378
[70]“Online Computer Dictionary for Computer and Internet Terms and Definitions”, http://www.webopedia.com (Last visited 2008-08-07)
[71]P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F. Freiling, “The Nepenthes Platform: An Efficient Approach To Collect Malware.”, Recent Advances in Intrusion Detection (RAID), 2006
[72]Peter Szor. “The Art of Computer Virus Research and Defense”, Symantec Press (Addison-Wesley), 2005.
[73]Peter Szor., “Hunting for metamorphic”, Virus Bulletin Conference, 2001.
[74]Spafford, E.H., “Crisis and aftermath.”, Communications of the ACM 32, 1989, pages.678-687
[75]Staniford, S., Paxson, V., Weaver, N., “How to 0wn the internet in your spare time.”, the 11th USENIX Security Symposium , 2002
[76]Steve R. White, “Open Problems in Computer Virus Research”, Virus Bulletin Conference, Munich, Germany, 1998
[77]TAUBIN, G., “A Signal Processing Approach to Fair Surface Design. In Computer Graphics”, SIGGRAPH 1995, pages.351-358.
[78]U. Bayer, C. Kruegel, and E. Kirda., “TTanalyze: A tool for analyzing malware.” the 15th Annual Conference of the European Institute for Computer Antivirus Research, Hamburg (Germany), April 2006.
[79]V. Sai Sathyanarayan, Pankaj Kohli, and Bezawada Bruhadeshwar, “Signature Generation and Detection of Malware Families”, Springer-Verlag Berlin Heidelberg, ACISP 2008, LNCS 5107, 2008, pages. 336-349.
[80]“Virus Taxonomy: Eighth Report of the International Committee on Taxonomy of Viruses”,ISBN 0122499514
[81]Woese C, Kandler O, Wheelis M, “Towards a natural system of organisms: Proposal for the domains Archaea, Bacteria, and Eucarya”, Proc. Nati. Acad. Sci. USA,Vol. 87, June 1990, pages. 4576-4579
[82]Ye, Yanfang, “An intelligent PE-malware detection system based on association mining” Journal in Computer Virology, 2008
[83]Zhang, Q., Reeves, D.S.: “MetaAware: Identifying Metamorphic Malware.”, Annual Computer Security Applications Conference (ACSAC),2007