1. Miller S, Curran K, Lunney T. Securing the internet through the detection of anonymous proxy usage. In: 2015 World Congress on Internet Security (WorldCIS). IEEE; 2015. p. 153–158.
2. Sandvine. Sandvine 2018 Internet Phenomena Report; 2018. Available from: https://www.sandvine.com/2018-internet-phenomena-report.
3. Systems C. Cisco 2018 Annual Cybersecurity Report; 2018. Available from: https://www.cisco.com/c/dam/m/digital/elq-cmcglobal/witb/acr2018/acr2018final.pdf?dtid=odicdc000016&ccid=cc000160&oid=anrsc005679&ecid=8196&elqTrackId=686210143d34494fa27ff73da9690a5b&elqaid=9452&elqat=2.
4. Corporation TM. C&C Commonly Used Port; 2019. Available from: https://attack.mitre.org/techniques/T1043/.
5. Chen YC, Li YJ, Tseng A, Lin T. Deep learning for malicious flow detection. In: 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). IEEE; 2017. p. 1–7.