• Linger R, Prowell S and Sayre K. Computing the behavior of malicious code with function extraction technology. Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies. (1-2).

    https://doi.org/10.1145/1558607.1558648