1. [1] C. J. Dietrich, C. Rossow, F. C. Freiling, H. Bos, M. Steen, and N. Pohlmann, “On botnets that use DNS for command and control,” Proc. IEEE European Conference on Computer Network Defence (EC2ND’11), pp. 9–16, Sept. 2011. DOI:10.1109/EC2ND.2011.16
2. [2] Sophos, “Overview of the sophos live protection architecture in SESC 9.5+,” https://www.sophos.com/en-us/support/knowledgebase/111334.aspx, Jan. 15, 2015 [May 1, 2015].
3. [3] Cisco, “Immunet 3.0,” http://www.immunet.com/main/index.html, Apr. 2015 [May 1, 2015].
4. [4] AVG, “AVG Internet Security 2015,” http://www.avg.com/us-en/internet-security, Apr. 2015 [May 1, 2015].
5. [5] SpamCop, “How can I check if an IP is on the list?” https://www.spamcop.net/fom-serve/cache/351.html, Apr. 2015 [May 1, 2015].