M. Antonakakis, D. Dagon, X. Luo, R. Perdisci, W. Lee et al., A Centralized Monitoring Infrastructure for Improving DNS Security, Recent Advances in Intrusion Detection (RAID), 2010.
DOI : 10.1007/978-3-642-15512-3_2

L. Bilge, E. Kirda, C. Kruegel, and M. Balduzzi, Exposure, Network and Distributed System Security Symposium -NDSS, 2011.
DOI : 10.1145/2584679

A. Budanitsky and G. Hirst, Evaluating WordNet-based Measures of Lexical Semantic Relatedness, Computational Linguistics, vol.17, issue.1, p.32, 2006.
DOI : 10.1016/S0022-5371(79)90604-2

H. Crawford and J. Aycock, Kwyjibo: automatic domain name generation. Software Practice and Experience 38, pp.1561-1567, 2008.
DOI : 10.1002/spe.885

D. Dagon and W. Lee, Global Internet Monitoring Using Passive DNS, 2009 Cybersecurity Applications & Technology Conference for Homeland Security, pp.163-168, 2009.
DOI : 10.1109/CATCH.2009.48

P. Faltstrom, P. Hoffman, and A. Costello, Internationalizing Domain Names in Applications (IDNA) RFC 3490 (Proposed Standard), p.5891, 2003.

S. Hao, N. Feamster, and R. Pandrangi, An internet wide view into DNS lookup patterns, Tech. rep., School of Computer Science, 2010.

D. Hindle, Noun classification from predicate-argument structures, Proceedings of the 28th annual meeting on Association for Computational Linguistics -, 1990.
DOI : 10.3115/981823.981857

A. Kamra, H. Feng, V. Misra, and A. Keromytis, The effect of DNS delays on worm propagation in an IPv6 internet, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., 2005.
DOI : 10.1109/INFCOM.2005.1498526

A. Kilgarriff, Thesauruses for natural language processing, International Conference on Natural Language Processing and Knowledge Engineering, 2003. Proceedings. 2003, 2003.
DOI : 10.1109/NLPKE.2003.1275859

P. Kolb, Experiments on the difference between semantic similarity and relatedness, 17th Nordic Conference of Computational Linguistics NODALIDA. Northern European Association for Language Technology, 2009.

D. Lin, Automatic retrieval and clustering of similar words, 17th international conference on Computational linguistics -COLING, 1998.

C. Manning and H. Schütze, Foundations of Statistical Natural Language Processing, 1999.

P. Mockapetris, Rfc 1035: Domain names -implementation and specification 16. Mockapetris, P.: Rfc 1034: Domain names -concepts and facilities, 1987.

P. Mockapetris and K. Dunlap, Development of the domain name system, Proceedings of the 1988 ACM SIGCOMM, pp.123-133, 1988.

R. Perdisci, I. Corona, D. Dagon, and W. Lee, Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces, 2009 Annual Computer Security Applications Conference, pp.311-320, 2009.
DOI : 10.1109/ACSAC.2009.36

D. Plonka and P. Barford, Context-aware clustering of DNS query traffic, Proceedings of the 8th ACM SIGCOMM conference on Internet measurement conference, IMC '08, pp.217-230
DOI : 10.1145/1452520.1452547

T. Segaran and J. Hammerbacher, Beautiful Data: The Stories Behind Elegant Data Solutions, chap. 14, 2009.

C. Wagner, J. François, R. State, T. Engel, A. Dulaunoy et al., SDBF: Smart DNS brute-forcer, 2012 IEEE Network Operations and Management Symposium, 2012.
DOI : 10.1109/NOMS.2012.6212021

URL : https://hal.archives-ouvertes.fr/hal-00748792

F. Weimer, Passive DNS replication, Conference on Computer Security Incident Handling, 2005.

M. Weir, S. Aggarwal, B. D. Medeiros, and B. Glodek, Password Cracking Using Probabilistic Context-Free Grammars, 2009 30th IEEE Symposium on Security and Privacy
DOI : 10.1109/SP.2009.8

S. Yadav, A. K. Reddy, A. N. Reddy, and S. Ranjan, Detecting algorithmically generated malicious domain names, Proceedings of the 10th annual conference on Internet measurement, IMC '10, pp.48-61, 2010.
DOI : 10.1145/1879141.1879148

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.221.1167