1. Khattak, S., Ramay, N.R., Khan, K.R., et al.: A taxonomy of botnet behavior, detection, and defense. IEEE Commun. Surv. Tutorials 16(2), 898–924 (2014)
2. Lecture Notes in Computer Science;P Chen,2014
3. Juels, A., Yen, T.F.: Sherlock Holmes and the case of the advanced persistent threat. In: Proceedings of the 5th USENIX Conference on Large-Scale Exploits and Emergent Threats, San Jose, CA, USA, pp. 63–72 (2012)
4. Rafael, A.R.G., Gabriel, M.F., Pedro, G.T.: Survey and taxonomy of botnet research through life-cycle. ACM Comput. Surv. 45(4), 1–33 (2013)
5. Zand, A., Vigna, G., Yan, X., et al.: Extracting probable command and control signatures for detecting botnets. In: Proceedings of the 29th Annual ACM Symposium on Applied Computing, pp. 1657–1662. ACM (2014)