1. Kandula, S., Katabi, D., Jacob, M., Berger, A., Botz-4-Sale: surviving organized DDOS attacks that mimic flash crowds. In: Proceedings of Second Symposium on Networked Systems Design and Implementation (NSDI) (2005)
2. CNN Technology News: Expert: Botnets No. 1 Emerging Internet Threat (2006).
http://www.cnn.com/2006/TECH/internet/01/31/furst/
3. Freiling, F., Holz, T., Wicherski, G.: Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of- service attacks. Technical report AIB-2005-07, CS Department of RWTH Aachen University (2005)
4. Cooke, E., Jahanian, F., McPherson, D.: The zombie roundup: understanding, detecting, and disrupting botnets. In: Proceedings of USENIX Workshop Steps to Reducing Unwanted Traffic on the Internet (SRUTI) (2005)
5. Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: MobiHoc 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Urbana-Champaign, IL, USA, pp. 46–57 (2005)