1. Alhomoud, A., Awan, I., Disso, J., & Younas, M. (2013). A next-generation approach to combating botnets. Computer, 46(4), 62–66. Retrieved from
http://doi.ieeecomputersociety.org/10.1109/MC.2013.67
.
2. Alnabulsi, H., & Islam, R. (2018). Identification of illegal forum activities inside the dark net. In 2018 international conference on machine learning and data engineering (iCMLDE).
https://doi.org/10.1109/iCMLDE.2018.00015
.
3. Arbor Networks. (2015, January). Arbor networks 10th annual worldwide infrastructure security report finds 50X increase in DDoS attack size in past decade. Press Release. Retrieved from
http://www.arbornetworks.com/arbor-networks-10th-annual-worldwide-infrastructure-security-report-finds-50x-increase-in-ddos-attack-size-in-past-decade
4. Arghire, I. (2017a). Poison Ivy RAT campaign leverges new delivery techniques. Security Week. Retrieved from
https://www.securityweek.com/poison-ivy-rat-campaign-leverages-new-delivery-techniques
5. Arghire, I. (2017b). Neverquest trojan ceases operations. Security Week. Retrieved from
https://www.securityweek.com/neverquest-trojan-ceases-operations