A Centralized Monitoring Infrastructure for Improving DNS Security, Recent Advances in Intrusion Detection (RAID), 2010. ,
DOI : 10.1007/978-3-642-15512-3_2
Exposure, Network and Distributed System Security Symposium -NDSS, 2011. ,
DOI : 10.1145/2584679
Evaluating WordNet-based Measures of Lexical Semantic Relatedness, Computational Linguistics, vol.17, issue.1, p.32, 2006. ,
DOI : 10.1016/S0022-5371(79)90604-2
Kwyjibo: automatic domain name generation. Software Practice and Experience 38, pp.1561-1567, 2008. ,
DOI : 10.1002/spe.885
Global Internet Monitoring Using Passive DNS, 2009 Cybersecurity Applications & Technology Conference for Homeland Security, pp.163-168, 2009. ,
DOI : 10.1109/CATCH.2009.48
Internationalizing Domain Names in Applications (IDNA) RFC 3490 (Proposed Standard), p.5891, 2003. ,
An internet wide view into DNS lookup patterns, Tech. rep., School of Computer Science, 2010. ,
Noun classification from predicate-argument structures, Proceedings of the 28th annual meeting on Association for Computational Linguistics -, 1990. ,
DOI : 10.3115/981823.981857
The effect of DNS delays on worm propagation in an IPv6 internet, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., 2005. ,
DOI : 10.1109/INFCOM.2005.1498526
Thesauruses for natural language processing, International Conference on Natural Language Processing and Knowledge Engineering, 2003. Proceedings. 2003, 2003. ,
DOI : 10.1109/NLPKE.2003.1275859
Experiments on the difference between semantic similarity and relatedness, 17th Nordic Conference of Computational Linguistics NODALIDA. Northern European Association for Language Technology, 2009. ,
Automatic retrieval and clustering of similar words, 17th international conference on Computational linguistics -COLING, 1998. ,
Foundations of Statistical Natural Language Processing, 1999. ,
Rfc 1035: Domain names -implementation and specification 16. Mockapetris, P.: Rfc 1034: Domain names -concepts and facilities, 1987. ,
Development of the domain name system, Proceedings of the 1988 ACM SIGCOMM, pp.123-133, 1988. ,
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces, 2009 Annual Computer Security Applications Conference, pp.311-320, 2009. ,
DOI : 10.1109/ACSAC.2009.36
Context-aware clustering of DNS query traffic, Proceedings of the 8th ACM SIGCOMM conference on Internet measurement conference, IMC '08, pp.217-230 ,
DOI : 10.1145/1452520.1452547
Beautiful Data: The Stories Behind Elegant Data Solutions, chap. 14, 2009. ,
SDBF: Smart DNS brute-forcer, 2012 IEEE Network Operations and Management Symposium, 2012. ,
DOI : 10.1109/NOMS.2012.6212021
URL : https://hal.archives-ouvertes.fr/hal-00748792
Passive DNS replication, Conference on Computer Security Incident Handling, 2005. ,
Password Cracking Using Probabilistic Context-Free Grammars, 2009 30th IEEE Symposium on Security and Privacy ,
DOI : 10.1109/SP.2009.8
Detecting algorithmically generated malicious domain names, Proceedings of the 10th annual conference on Internet measurement, IMC '10, pp.48-61, 2010. ,
DOI : 10.1145/1879141.1879148
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.221.1167