1. [1] K. Sato, K. Ishibashi, T. Toyono, and N. Miyake, “Extending black domain name list by using co-occurrence relation between DNS queries,” Proc. 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, San Jose, CA, April 2010.
2. [2] S. Staniford, V. Paxson, and N. Weaver, “How to own the Internet in your spare time,” Proc. 11th USENIX Security Symposium, San Francisco, CA, Aug. 2002.
3. [3] E. Cooke, F. Jahanian, and D. McPherson, “The zombie roundup: Understanding, detecting, and disrupting botnets,” Proc. Steps to Reducing Unwanted Traffic on the Internet Workshop, Cambridge, MA, July 2005.
4. [4] M.A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, “A multifaceted approach to understanding the botnet,” Proc. 6th ACM SIGCOMM Conference on Internet Measurement, Rio de Janeiro, Brazil, Oct. 2006.
5. [5] U. Bayer, I. Habibi, D. Balzarotti, E. Krida, and C. Kruege, “A view on current malware behaviors,” Proc. 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, Boston, MA, April 2009.