5KONRAD R,GUIDO S,TOBIAS L. Detecting the phoning home of malicious software[A].Los Alamitor,CA,USA:IEEE Computer Society,2010.298-304.
6PETER W,LEYLA B,THORSTEN H. Automatically generating models for Botnet detection[A].Los Alamitos,CA,USA:IEEE Computer Society,2009.104-110.
7MCCUSKER O,KIAYIAS A,WALLUCK D. A combined fusion and mining strategy for detecting Botnets[J].International Journal of Information Security,2009,(11):71-82.
8HE Yuanchen,ZHONG Zhenyu,TANG Yuchun. Mining DNS for malicious domain registrations[J].Journal of the ACM,2010,(32):335-348.
10VILLAMAR R,BRUSTOLONI J C. Identifying Botnets using anomaly detection techniques applied to DNS traffic[A].Los Alamitos,CA,USA:IEEE Computer Society,2008.476-481.