1. Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the 17th USENIX Security Symposium Security 2008 (2008)
2. Gu, G., Zhang, J., Lee, W.: BotSniffer: Detecting botnet command and control channels in network traffic. In: Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008), February 2008
3. McCoy, D., Pitsillidis, A., Jordan, G., Weaver, N., Kreibich, C., Krebs, B., Voelker, G.M., Savage, S., Levchenko, K.: PharmaLeaks: understanding the business of online pharmaceutical affiliate programs. In: Proceedings of the 21st USENIX Conference on Security Symposium, Series Security 2012, Berkeley, CA, USA. USENIX Association, pp. 1 (2012)
4. Karami, M., Damon, M.: Understanding the emerging threat of DDOS-as-a-Service. In: Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (2013)
5. Google safe browsing.
https://developers.google.com/safe-browsing/