M. A. Aizerman, E. A. Braverman, and L. Rozonoer, Theoretical foundations of the potential function method in pattern recognition learning. Number 25 in Automation and Remote Control, pp.821-837, 1964.

G. Ateniese, G. Felici, L. V. Mancini, A. Spognardi, A. Villani et al., Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers, International Journal of Security and Networks, vol.10, issue.3, 1306.
DOI : 10.1504/IJSN.2015.071829

URL : http://arxiv.org/abs/1306.4447

I. [. Boser, V. N. Guyon, and . Vapnik, A training algorithm for optimal margin classifiers, Proceedings of the fifth annual workshop on Computational learning theory , COLT '92, pp.144-152, 1992.
DOI : 10.1145/130385.130401

URL : http://www.svms.org/training/BOGV92.pdf

K. Borg, Real time detection and analysis of pdf-files, 2013.

. Cvedetails, Adobe vulnerabilities statistics. https://www.cvedetails.com/product, p.2017

J. Kittilsen, Detecting malicious pdf documents, 2011.

D. Maiorca, G. Giacinto, and I. Corona, A Pattern Recognition System for Malicious PDF Files Detection, pp.510-524, 2012.
DOI : 10.1007/978-3-642-31537-4_40

]. D. Ste06 and . Stevens, Didier stevens blog, 2006.