Which analysis method relies on actions from previously known malicious files, and alerts when similar characteristics are detected, helping to identify a new variant of the malicious file or a zero-day threat?
A. Signature-based analysis
B. Heuristic-based analysis
C. Availability analysis
D. Trend anomaly analysis