E. Stinson and J. C. Mitchell, “Characterizing the Remote Control Behavior of Bots,” Lecture Notes in Computer Science, vol. 4579, p. 20, 2007.
C. J. Dietrich, “Identification and Recognition of Remote-Controlled Malware,” master, computer science, mannheim, 2013.
G. Fedynyshyn, M. C. Chuah, and G. Tan, “Detection and Classification of Different Botnet C&C Channels,” in Autonomic and Trusted Computing: 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011. Proceedings, J. M. A. Calero, L. T. Yang, F. G. Marmol, L. J. Garcia Villalba, A. X. Li, and Y. Wang, Eds., ed Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 228-242, 2011.
S. Ashutosh, “Social networking for botnet command and control,” master Project, Computer Science, San Jose State University, 2012.
J. Goebel and T. Holz, “Rishi: identify bot contaminated hosts by IRC nickname evaluation,” presented at the HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets CA, USA, 2007.
S. Shah and V. M. Lomte, “The Survey Paper on ASP2P: An Advanced Botnet Based on Social Networks over Hybrid P2P,” International Journal of Science and Research (IJSR), vol. 3, p. 6, December 2014.
P. Jaikumar and A. C. Kak, “A graph-theoretic framework for isolating botnets in a network,” Security and Communication Networks, vol. 8, p. 19, 28 February 2012.
S. Chang and T. E. Daniels, “P2P botnet detection using behavior clustering & statistical tests,” 2nd ACM workshop on Security and artificial intelligence, p. 8, 2009.
P. Wang, S. Sparks, and C. C. Zou, “An Advanced Hybrid Peer-to-Peer Botnet,” IEEE Transactions on Dependable and Secure Computing, vol. 7, p. 113, 2010.
A. blue, Hooks, 2011. Available: https://msdn.microsoft.com/en-us/library/windows/desktop/ms632589%28v=vs.85%29.aspx
M. Russinovich and D. A. Solomon, “Windows Internals Part 1: Microsoft,” 2012.
R. Mark. Autoruns for Windows, 2015. Available: https://technet.microsoft.com/en-us/sysinternals/bb963902.aspx
J. Binkley and S. Singh, “An algorithm for anomaly-based botnet detection,” In: Proc. Reducing Unwanted Traffic on the Internet, 2007. Available: http://static.usenix.org/events/sruti06/tech/full_papers/binkley/binkley_html/
P. P. G. Gu, V. Yegneswaran, and M. Fong, “BotHunter: Detecting malware infection through ids-driven dialog correlation,” 2007. Available: http://static.usenix.org/legacy/events/sec07/tech/full_papers/gu/gu_html/
G. Gu, R. Perdisci, J. Zhang, and W. Lee, “BotMiner: Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet Detection,” USENIX Security Symposium, 2008.
G. Gu, J. Zhang, and W. Lee, “BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic,” presented at the Computer Science and Engineering Faculty Publications, 2008.
M. P. Collins and M. K. Reiter, “Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs,” Software Engineering Institute p. 20, September 2007.
X. Hu and M. Knysz, “Rb-seeker: Auto-detection of redirection botnets,” presented at the Proceedings of the Network and Distributed System Security Symposium, San Diego, California, USA, 2009.
M. P. Collins, “Using uncleanliness to predict future botnet addresses,” presented at the 7th ACM SIGCOMM conference on Internet measurement 2007.
A. Karasaridis and B. Rexroad, “Wide-scale botnet detection and characterization,” presented at the HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets CA, USA, 2007.
E. Cooke, “The Zombie roundup: understanding, detecting, and disrupting botnets,” presented at the SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet, CA, USA, 2005.
E. Stinson and J. C. Mitchell, “Characterizing Bots’ Remote Control Behavior,” presented at the 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007
C. Yan, T. D. Dimitriou, and J. Zhou, “Using Failure Information Analysis to Detect Enterprise Zombies,” presented at the 5th International ICST Conference, Greece, Athens, Secure Comm. 2009.
K. Singh, A. Srivastava, J. Giffin, and W. Lee, “Evaluating email’s feasibility for botnet command and control,” presented at the Dependable Systems and Networks with FTCS and DCC, DSN 2008, IEEE International Conference on, 2008.
Y. Zhao, Y. Xie, and F. Yu, “BotGraph: Large Scale Spamming Botnet Detection” The 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI '09), April 1, 2009 2009.
L. Zhuang, J. Dunagan, and D. R. Simon, “Characterizing botnets from email spam records,” presented at the LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, CA, USA, 2008.
Y. Xie, F. Yu, and R. Panigrahy, “Spamming Botnet: Signatures and Characteristics,” presented at the ACM SIGCOMM 2008, Seattle, WA USA, 2008.
S. Poland, “How to create a twitter bot,” 2007. Available: http://blog.stevepoland.com/how-to-create-a-twitter-bot
DigiNinja, Kreiosc2: Poc using twitter as its command and control channel, 2008. Available: http://www.digininja.org
J. P. John, A. Moshchuk, and S. D. Gribble, “Studying spamming botnets using Botlab,” Presented at the NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation CA, USA, 2009.
F. S. Inc, “Web security trends report q4 .Technical report,” 2007. Available: http://www.finjan.com/Content.aspx?id=827
J. Baltazar, J. Costoya, and R. Flores, “The Real Face of KOOBFACE: The Largest Web 2.0 Botnet Explained,” Trend Micro Threat Research, p. 18, 2009.
T. Easton and K. Johnson, “Social zombies,” presented at the DEFCON, CA, USA, 2009.
V. S. M. D. Base, “Virus Sign Malware Data Base,” Ed, 2014.
C. SandBox, “CW_Sand Box Data,” 2014. Available: http://pi1.informatik.uni-mannheim.de/malheur/