1. Gu G., Perdisci R., Zhang J., and Lee W.: Botminer: clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Usenix Security Symposium, vol. 5, No. 2, pp. 139–154 (2008)
2. Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee, W.: Bothunter: detecting malware infection through ids-driven dialog correlation. In: Usenix Security Symposium, vol. 7, pp. 1–16 (2007)
3. Zhuang, L., Dunagan, J., et al.: Characterizing botnets from email spam records. In: USENIX Workshop on Large-Scale Exploits and Emergent Threats, vol. 8, pp. 1–9 (2008)
4. Rajab, M.A., Zarfoss, J., Monrose, F., Terzis, A.: A multifaceted approach to understanding the botnet phenomenon. In: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, pp. 41–52 (2006)
5. Villamarín-Salomón, R., Villamarín-Salomón, J.: Identifying botnets using anomaly detection techniques applied to DNS traffic. In: Proceedings of the 5th IEEE Consumer Communications and Networking Conference, pp. 476–481 (2008)