1. BGR News Report (2016).
https://www.bgr.in/news/cyber-crimes-in-india-rose-19-times-between-2005-2014/
2. Narang P, Ray S, Hota C (2014) Peershark: detecting peer-to-peer botnets by tracking conversations. In: IEEE security and privacy workshops
3. Holz T, Steiner M, Dahl F, Biersack E, Freiling F (2008) Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm. In: Proceedings of the 1st USENIX workshop on large-scale exploits and emergent threats
4. Nunnery C, Sinclair G, Kang BB (2010) Tumbling down the rabbit hole: exploring the idiosyncrasies of botmaster systems in a multi-tier botnet infrastructure. In: Proceedings of the 3rd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more
5. Lelli A (2018) Zeusbot/Spyeye P2P updated, fortifying the botnet.
https://www.symantec.com/connect/blogs/zeusbotspyeye-p2p-updated-fortifying-botnet