[1]Trend Labs, "什麼是APT進階持續性威脅(Advanced Persistent Threat, APT)," 資安趨勢部落格, 2011. [Online]. Available: https://blog.trendmicro.com.tw/?p=123. [Accessed: Jul. 19, 2018].
[2]"高級長期威脅," Wikipedia, 2018. [Online]. Available: https://zh.wikipedia.org/wiki/高级长期威胁. [Accessed: Jul. 19, 2018].
[3]W. Rafferty, "M-Trends: Advanced Persistent Threat Malware," FireEye, 2010. [Online]. Available: https://www.fireeye.com/blog/threat-research/2010/01/m-trends-advanced-persistent-threat-malware.html. [Accessed: Jul. 19, 2018].
[4]"Process Injection," Attack.mitre.org, 2018. [Online]. Available: https://attack.mitre.org/wiki/Technique/T1055. [Accessed: Jul. 19, 2018].
[5]Symantec, "Internet security threat report (April 2017)," [Online]. Available: https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf. [Accessed: Jul. 19, 2018].
[6]L. Nataraj, S. Karthikeyan and B. S. Manjunath, "Sattva: Sparsity inspired classification of malware variants," in Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. ACM, 2015, pp. 135–140.
[7]"Desktop Operating System Market Share Worldwide," StatCounter Global Stats, 2017. [Online]. Available: http://gs.statcounter.com/os-market-share/desktop/worldwide [Accessed: Nov. 26, 2017].
[8]"Operating System Market Share," NetMarketShare, 2017. [Online]. Available: https://www.netmarketshare.com/. [Accessed: Nov. 26, 2017].
[9]A. Hosseini, "Ten Process Injection Techniques: A Technical Survey of Common and Trending Process Injection Techniques," Endgame, 2017. [Online]. Available: https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process. [Accessed: Jul. 19, 2018].
[10]D. Vidyarthi, "Detection of Stealth Process using Hooking," in Proceedings of the Third International Symposium on Women in Computing and Informatics. ACM, 2015, pp. 602-607.
[11]S. Kim, J. Park, K. Lee, I. You and K. Yim, "A Brief Survey on Rootkit Techniques in Malicious Codes," Journal of Internet Services and Information Security (JISIS), vol. 3, no. 4, pp. 134-147, 2012.
[12]"Working with the AppInit_DLLs registry value," [Online]. Available: https://support.microsoft.com/en-us/help/197571. [Accessed: Nov. 27, 2017].
[13]J. Berdajs and Z. Bosnić, "Extending applications using an advanced approach to Dll injection and Api hooking," Software: Practice and Experience, vol. 40, no. 7, pp. 567-584, 2010.
[14]R. Kuster, "Three Ways to Inject Your Code into Another Process," Codeproject, 2003. [Online]. Available: https://www.codeproject.com/Articles/4610/Three-Ways-to-Inject-Your-Code-into-Another-Proces. [Accessed: Nov. 27, 2017].
[15]B. Antoniewicz, "Windows DLL Injection Basics," Open Security Research, 2013. [Online]. Available: http://blog.opensecurityresearch.com/2013/01/windows-dll-injection-basics.html. [Accessed: Nov. 27, 2017].
[16]"Differences Between Applications and DLLs," [Online]. Available: https://msdn.microsoft.com/en-us/library/d1587c1h.aspx. [Accessed: Nov. 26, 2017].
[17]"Advantages of Using DLLs," [Online]. Available: https://msdn.microsoft.com/en-us/library/dtba4t8b.aspx. [Accessed: Nov. 26, 2017].
[18]"AppInit DLLs and Secure Boot," Microsoft Developer Network, 2018. [Online]. Available: https://msdn.microsoft.com/en-us/library/dn280412.aspx. [Accessed: Jul. 17, 2017].
[19]"Extra Window Memory Injection," Attack.mitre.org, 2018. [Online]. Available: https://attack.mitre.org/wiki/Technique/T1181. [Accessed: Jul. 19, 2018].
[20]M. Christodorescu, S. Jha, S. A. Seshia, D. Song and R. E. Bryant, "Semantics-aware malware detection," 2005 IEEE Symposium on Security and Privacy (S&P''05), 2005, pp. 32-46.
[21]N. Idika and A. P. Mathur, "A survey of malware detection techniques," Purdue University, 2007.
[22]M. Egele, T. Scholte, E. Kirda and C. Kruegel, "A survey on automated dynamic malware-analysis techniques and tools," ACM computing surveys (CSUR), vol. 44, no. 2, 2012.
[23]林志鴻 and 楊中皇, "用於網路鑑識分析之惡意程式搜集系統設計與實作," in 全國資訊安全會議, 2011.
[24]H. I. Lim, "Detecting Malicious Behaviors of Software through Analysis of API Sequence k-grams," Computer Science and Information Technology, vol. 4, no. 3, pp. 85-91, 2016.
[25]C. Wang, J. Pang, R. Zhao and X. Liu, "Using API Sequence and Bayes Algorithm to Detect Suspicious Behavior," 2009 International Conference on Communication Software and Networks, 2009, pp. 544-548.
[26]M. Alazab, S. Venkataraman and P. Watters, "Towards understanding malware behaviour by the extraction of API calls," 2010 Second Cybercrime and Trustworthy Computing Workshop, 2010, pp. 52-59.
[27]R. Veeramani and N. Rai, "Windows API based malware detection and framework analysis," in International Conference on Networks and Cyber Security, vol. 25, 2012.
[28]C. Wang, J. Pang, R. Zhao, W. Fu and X. Liu, "Malware Detection Based on Suspicious Behavior Identification," 2009 First International Workshop on Education Technology and Computer Science, 2009, pp. 198-202.
[29]P. Faruki, V. Laxmi, M. S. Gaur and P. Vinod, "Behavioural detection with API call-grams to identify malicious PE files," in Proceedings of the First International Conference on Security of Internet of Things. ACM, 2012, pp. 85-91.
[30]M. Alazab, R. Layton, S. Venkataraman and P. Watters, "Malware detection based on structural and behavioural features of api calls," in Proceedings of the 1st International Cyber Resilience Conference, 2010.
[31]C. Ravi and R. Manoharan, "Malware Detection using Windows Api Sequence and Machine Learning," International Journal of Computer Applications, vol. 43, no. 17, pp. 12-16, 2012.
[32]張子敬, "偵測以注入惡意DLL檔案之惡意程式研究," 碩士論文, 國立中山大學資訊管理學系, 2016.[33]龍志雄, "在動態環境中偵測動態連結程式庫的注入攻擊," 碩士論文, 國立中山大學資訊管理學系, 2017.
[34]L. Nataraj, S. Karthikeyan, G. Jacob and B. S. Manjunath, "Malware images: visualization and automatic classification," in Proceedings of the 8th international symposium on visualization for cyber security. ACM, 2011, p. 4.
[35]W. Hardy, L. Chen, S. Hou, Y. Ye and X. Li, "Dl4md: A deep learning framework for intelligent malware detection," in Proceedings of the International Conference on Data Mining (DMIN), 2016, p. 61.
[36]M. G. Schultz, E. Eskin, F. Zadok and S. J. Stolfo, "Data mining methods for detection of new malicious executables," Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, Oakland, CA, USA, 2001, pp. 38-49.
[37]J. Z. Kolter and M. A. Maloof, "Learning to detect malicious executables in the wild," in Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2004, pp. 470–478.
[38]D. Gibert, "Convolutional neural networks for malware classification," Master’s thesis, Universitat Politecnica de Catalunya, 2016.
[39]M. Kalash, M. Rochan, N. Mohammed, N. D. B. Bruce, Y. Wang and F. Iqbal, "Malware Classification with Deep Convolutional Neural Networks," 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, 2018, pp. 1-5.
[40]Y. LeCun, "LeNet-5, convolutional neural networks," 2015. [Online]. Available: http://yann.lecun.com/exdb/lenet/. [Accessed: Aug. 2, 2018].
[41]"Intro to convolutional neural networks," TensorFlow, [Online]. Available: https://www.tensorflow.org/tutorials/layers. [Accessed: Aug. 2, 2018].
[42]K. Simonyan and A. Zisserman, "Very deep convolutional networks for large-scale image recognition," arXiv preprint arXiv:1409.1556, 2014.
[43]A. Cortesi, "scurve," GitHub, [Online]. Available: https://github.com/cortesi/scurve. [Accessed: Jul. 19, 2018].
[44]C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens and Z. Wojna, "Rethinking the inception architecture for computer vision," in Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2818-2826, 2016.
[45]A. Alemi, "Improving Inception and Image Classification in TensorFlow," Google AI Blog, 2016. [Online]. Available: https://ai.googleblog.com/2016/08/improving-inception-and-image.html. [Accessed: Sep. 3, 2018].
[46]J. Donahue, Y. Jia, O. Vinyals, J. Hoffman, N. Zhang, E. Tzeng and T. Darrell, "Decaf: A deep convolutional activation feature for generic visual recognition," in International conference on machine learning, pp. 647-655, 2014.
[47]"Module google/imagenet/inception_v3/feature_vector/1," TensorFlow, [Online]. Available: https://www.tensorflow.org/hub/modules/google/imagenet/inception_v3/feature_vector/1. [Accessed: Aug. 2, 2018].