1. Chiang K, Lloyd L. A case study of the Rustock rootkit and spam bot. Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots’07), Apr 10-11, 2007, Cambridge, MA, USA. Berkeley, CA, USA: USENIX Association, 2007
2. Cooke E, Jahanian F, McPherson D. The zombie roundup: Understanding, detecting, and disturbing botnets. Proceedings of the 1st Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI’05), Jul 7-8, 2005, Cambridge, MA, USA. Berkeley, CA, USA: USENIX Association, 2005: 39-44
3. Xie Y L, Yu F, Achan K,et al. Spamming botnets: Signatures and characteristics. Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM’08), Aug 17-22, 2008, Seattle, WA, USA. New York, NY, USA: ACM, 2008: 171-182
4. Villamarin-Salomon R, Brustoloni J C. Bayesian bot detection based on DNS traffic similarity. Proceedings of the 2009 ACM Symposium on Applied Computing (SAC’09), Mar 8-12, 2009, Honolulu, HI, USA. New York, NY, USA: ACM, 2009: 2035-2041
5. Lu W, Tavallaee M, Ghorbani A A. Automatic discovery of botnet communities on large-scale communication networks. Proceedings of the 4th ACM Symposium on Information, Computer and Communications Security (ASIACCS’09), Mar 10-12, 2009, Sydney, Australia. New York, NY, USA: ACM, 2009: 1-10
6. Karasaridis A, Rexroad B, Hoeflin D. Wide-scale botnet detection and characterization. Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots’07), Apr 10-11, 2007, Cambridge, MA, USA. Berkeley, CA, USA: USENIX Association, 2007
7. Cheng Fang, Wang Peng. Development of modern network testing. Journal of Chongqing University of Posts and Telecommunications: Natural Science Edition: 2008, 20(Sup): 57-60 (in Chinese)
8. AsSadhan B, Moura J M F, Lapsley D, et al. Detecting botnets using command and control traffic. Proceedings of the 8th IEEE International Symposium on Network Computing and Applications (NCA’09), Jul 9-11, 2009, Cambridge, MA, USA. Los Alamitos, CA, USA: IEEE Computer Society, 2009: 156-162
9. Stone-Gross B, Cova B, Cavallaro L, et al. Your botnet is, my botnet: Analysis of a botnet takeover. Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS’09), Nov 9-13, 2009, Chicago, IL, USA. New York, NY, USA: ACM, 2009
10. Wei C, Sprague A, Warner G. Detection of networks blocks used by the storm worm botnet. Proceedings of the ACM Southeast Regional Conference (ACM-SE’08), Mar 28-29, 2008, Auburn, AL, USA. New York, NY, USA: ACM, 2008: 356-360
11. Li Z C, Goyal A, Chen Y, et al. Automating analysis of large-scale botnet probing events. Proceedings of the 4th ACM Symposium on Information, Computer and Communications Security (ASIACCS’09), Mar 10-12, 2009, Sydney, Australia. New York, NY, USA: ACM, 2009:11-22
12. De Roo R D. A simplified calculation of the kurtosis for RFI detection. Proceedings of the IEEE International Geoscience and Remote Sensing Symposium (IGARSS’08), Jul 6-11, 2008, Boston, MA, USA. Piscatawaw, NJ, USA: IEEE, 2008
13. Zandy V C, Miller B P. Reliable network connections. Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (MOBICOM’02), Sep 23-26, Atlanta, GA, USA. New York, NY, USA: ACM, 2002: 95-106
|