1. Ianelli, N., Hackworth, A.: Botnets as a vehicle for online crime. In: CERT Coordination Center (2005)
2. Nazario, J., Holz, T.: As the net churns: fast-flux botnet observations. In: 3rd International Conference on Malicious and Unwanted Software, 2008. MALWARE 2008, pp. 24–31 Oct (2008)
3. Holz, T., Gorecki, C., Rieck, K., Freiling, F.C.: Measuring and detecting fast-flux service networks (2008). In: Symposium on Network and Distributed System Security - NDSS(2008)
4. Antonakakis, M., Perdisci, R., Nadji, Y., Vasiloglou, N., Abu-Nimeh, S., Lee, W., Dagon, D.: From throw-away traffic to bots: detecting the rise of DGA-based Malware. In: Proceedings of the 21st USENIX Security Symposium (USENIX Security 12), pp. 491–506, USENIX, Bellevue, WA (2012)
5. Anagnostopoulos, M., Kambourakis, G., Kopanos, P., Louloudakis, G., Gritzalis, S.: DNS amplification attack revisited. Comput. Secur. 39(Part B), 475–485 (2013)