1. Spamming botnets
2. [2] A. Ramachandran and N. Feamster, “Understanding the network-level behavior of spammers,” Proc. 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, vol.36, no.4, Pisa, Italy, Sept. 2006.
3. [3] D.S. Anderson, C. Fleizach, S. Savage, and G.M. Voelker, “Spamscatter: Characterizing Internet Scam Hosting Infrastructure,” Proc. USENIX Security Symposium, Boston, 2007.
4. [4] R. Jennings, “The global economic impact of spam, 2005 report,” Technical Report, Ferris Research, 2005.
5. [5] Y. Kawakoya, M. Akiyama, K. Aoki, M. Itoh, and H. Takakura, “Investigation of spam mail driven web-based passive attack,” IEICE Technical Report, ICSS2009-5, May 2009.