1. [1] Masuya, M., Yamanoue, T. and Kubota, S.: An Experience of Monitoring University Network Security Using a Commercial Service and DIY Monitoring, Proc. 34th Annual ACM SIGUCCS Conference on User Services, pp.225-230, ACM (online), DOI: http://doi.acm.org/10.1145/1181216.1181267 (2006).
2. [2] Mattauch, T., Hatoum, R. and Pettit, H: Building a call center in 2 days: How a world class support center responds to crisis, Proc. 40th Annual ACM SIGUCCS Conference on User Services, pp.97-100, ACM (online), DOI: http://doi.acm.org/10.1145/2382456.2382478 (2012).
3. [3] Puri, R.: Bots & Botnet: An Overview, SANS InfoSec Reading Room (Dec. 2003), available from <http://www.sans.org/rr/whitepapers/malicious/>.
4. [4] Yamanoue, T., Oda, K. and Shimozono. K: Capturing Malicious Bots using a Beneficial Bot and Wiki, Proc. 40th Annual ACM SIGUCCS Conference on User services, pp.91-96, ACM (online), DOI: https://doi.org/10.1145/2382456.2382477 (2012).
5. [5] Yamanoue, T., Oda, K. and Shimozono, K.: A Malicious Bot Capturing System using a Beneficial Bot and Wiki, Journal of Information Processing (JIP), Vol.21, No.2, pp.237-245 (2013).