Appendix
- Kaspersky, A Brief History of Malware
- Accenture. (2017). The Cost of Cybercrime Study
- Ahern, D. M., Clouse, A., & Turner, R. (2004). CMMI distilled: A practical introduction to integrated process improvement (3rd ed.). Addison-Wesley.
- Argentina National Ministry of Security. (2019). Informe de Ciberdelito
- Atlantic Council. (2020). Breaking trust: Shades of crisis across an insecure software supply chain
- Bendich, P., Marron, J. S., Miller, E., Pieloch, A., & Skwerer, S. (2016). Persistent homology analysis of brain artery trees. Annals of Applied Statistics, 10 (1).
- Brundage, et al. (2018). The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation
- Buczak, Anna L. and Erhan Guven. (2016). A Survey of Data ...
Get Data Science for Malware Analysis now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.