1. Kogan, R.: Bedep trojan malware spread by the angler exploit kit gets political. SpiderLabs Blog (2015).
https://www.trustwave.com/Resources/SpiderLabs-Blog/Bedep-trojan-malware-spread-by-the-Angler-exploit-kit-gets-political/
2. Karim, M.E., Walenstein, A., Lakhotia, A., Parida, L.: Malware phylogeny generation using permutations of code. J. Comput. Virol. 1, 13–23 (2005)
3. Gu, G., Zhang, J., Lee, W.: BotSniffer: detecting botnet command and control channels in network traffic. In: Proceedings of the Annual Network and Distributed System Security Symposium (2008)
4. Perdisci, R., Lee, W., Feamster, N.: Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. In: Proceedings of the USENIX Conference on Networked Systems Design and Implementation (2010)
5. Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence);K Bartos,2015