1. Alexa. (2017) Retrieved March 1, 2017, from https://www.alexa.com/topsites
2. An anomaly based botnet detection approach for identifying stealthy botnets.;S.Arshad;Proceedings of the IEEE International Conference on Computer Applications and Industrial Electronics,2011
3. Cisco. (n.d.). IOS NetFlow. Retrieved March 1, 2017 from http://www.cisco.com/en/US/products/ps6601/products_ios_protocol_group_home.html
4. Cox, O. (2013). Citadel’s defences breached. Symantec. Rederived March 13, 2017, from http://www.symantec.com/connect/blogs/citadel-s-defenses-breached