1. Zhuang, L., Dunagan, J., Simon, D.R., Wang, H.J., Tygar, J.D.: Characterizing botnets from email spam records. In: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, San Francisco, vol. (2), pp. 1–9 (2008)
2. Li, F., Hsieh, M.H.: An Empirical Study of Clustering Behavior of Spammers and Group-based Anti-Spam Strategies. In: Proceedings of 3rd Conference on Email and Anti-Spam (CEAS), Mountain View, CA, pp. 21–28 (2006)
3. Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., Osipkov, I.: Spamming botnets: signatures and characteristics. ACM SIGCOMM Computer Communication Review 38(4) (October 2008)
4. Song, J., Inoue, D., Eto, M., Kim, H., Nakao, K.: An Empirical Study of Spam: Analyzing Spam Sending Systems and Malicious Web Servers. In: 10th Annual International Symposium on Applications and the Internet (SAINT 2010), Seoul, Korea, pp. 19–23 (July 2010)
5. Anderson, D.S., Fleizach, C., Savage, S., Voelker, G.M.: Spamscatter: Characterizing Internet Scam Hosting Infrastructure. In: Proceedings of the USENIX Security Symposium, Boston (2007)