1. Alieyan K, ALmomani A, Manasrah A, Kadhum MM (2015) A survey of botnet detection based on DNS. Neural Comput Appl 1–18. doi: 10.1007/s00521-015-2128-0
2. Caglayan A, Toothaker M, Drapeau D, Burke D, Eaton G (2012) Behavioral analysis of botnets for threat intelligence. IseB 10(4):491–519
3. Otgonbold T (2014) ADAPT: an anonymous, distributed, and active probing-based technique for detecting malicious fast-flux domains. IOWA STATE UNIVERSITY, A graduate theses and dissertations. Paper 14225, pp 1–57. http://lib.dr.iastate.edu/etd/14225
4. ALmomani A, Wan T, Manasrah A, Altaher A, Backlizet M, Ramadas S (2013) An enhanced online phishing e-mail detection framework based on evolving connectionist system. Int J Innov Comput Inf Control (IJICIC) 9(3):169–175
5. Konte M, Feamster N, Jung J (2009) Dynamics of online scam hosting infrastructure. In: Passive and active network measurement, vol 5448. Springer, pp 219–228