1. Zhu, X., Tao, H., Wu, Z., Cao, J., Kalish, K., Kayne, J.: Fraud Prevention in Online Digital Advertising. Springer, Heidelberg (2017).
https://doi.org/10.1007/978-3-319-56793-8
2. Martins, C.A., Monard, M.C., Matsubara, E.T.: Reducing the dimensionality of bag-of-words text representation used by learning algorithms. In: Proceedings of 3rd IASTED International Conference on Artificial Intelligence and Applications, pp. 228–233 (2003). Author, F., Author, S.: Title of a proceedings paper. In: Editor, F., Editor, S. (eds.) Conference 2016, LNCS, vol. 9999, pp. 1–13. Springer, Heidelberg (2016)
3. Silva, S.S.C., Silva, R.M.P., Pinto, R.C.G., Salles, R.M.: Botnets: a survey. Comput. Netw. 57(2), 378–403 (2013)
4. AsSadhan, B., Moura, J., Lapsley, D., Jones, C., Strayer, W.: Detecting botnets using command and control traffic. In: Eighth IEEE International Symposium on Network Computing and Applications, NCA 2009, pp. 156–162 (2009)
5. Seyyar, M.B., Çatak, F.Ö., Gül, E.: Detection of attack-targeted scans from the apache HTTP server access logs. Appl. Comput. Inf. 14(1), 28–36 (2018)