K. Park, The Internet as a Complex System, 2002.

K. Park and W. Willinger, The Internet as a Large-scale Complex System, Journal of the Royal Statistical Society: Series A (Statistics in Society, vol.170, issue.11, pp.260-260, 2007.

J. Navarez, C. Seifert, B. Endicott-popovsky, I. Welch, and P. , D r i v e -By- Downloads, 2008.

D. Clark, S. Shenker, and A. Falk, GENI Research Plan. GDD-06-28, Version 4, 2007.

C. Seifert, Know Your Enemy: Behind The Scenes Of Malicious Web Servers. The Honeynet Project, 2008.

C. Seifert, R. Steenson, T. Holz, B. Yuan, and M. Davis, Know Your Enemy: Malicious Web Servers. T h e H o n e ynet Project http, 2008.

C. Seifert, R. Steenson, I. Welch, and P. Komisarczuk, Capture -A Tool for Behavioural Analysis of Applications and Documents'. In: The Digital Forensic Research Workshop, 2007.

C. Seifert, I. Welch, and P. Komisarczuk, HoneyC -The Low-Interaction Client Honeypot, the Proceedings of the 2007 NZCSRCS, 2007.

D. Plonka, Flawed routers flood university of wisconsin internet time server

R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. A. Peterson, Characteristics of internet background radiation, Proceedings of the 4th ACM SIGCOMM conference on Internet measurement , IMC '04, pp.27-40, 2004.
DOI : 10.1145/1028788.1028794

V. Yegneswaran, P. Barford, and J. Ullrich, Internet intrusions: global characteristics and prevalence, Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pp.138-147, 2003.

. Shadowserver, Team Cymru. The Team Cymru Darknet P r o j e c t, cymru.com/Darknet/index.html and Dragon Research Group

K. Dooley, Complex adaptive systems: a nominal definition, 1996.

N. Foukia and S. Hassas, Managing computer networks security through self-organisation: a complex system perspective. In: Engineering self-organising systems, pp.124-162, 2004.

I. Green, T. Raz, and M. Zviran, Analysis of active intrusion prevention data for predicting hostile activity in computer networks, Communications of the ACM, vol.50, issue.4, pp.63-68, 2007.
DOI : 10.1145/1232743.1232749

M. Glickman, J. Balthrop, and S. Forrest, A Machine Learning Evaluation of an Artificial Immune System, Evolutionary Computation, vol.1, issue.3, pp.179-212, 2005.
DOI : 10.1073/pnas.90.5.1691

R. Farrow and D. Geer, Workshop Summary In: HotBots '07, The First Workshop on Hot Topics in Understanding Botnets, 2007.

K. Shafi and H. A. Abbass, Biologically-inspired Complex Adaptive Systems approaches to Network Intrusion Detection, Information Security Technical Report, vol.12, issue.4, pp.209-217, 2007.
DOI : 10.1016/j.istr.2007.09.001

D. Wolpert, K. Tumer, and J. Frank, Using collective intelligence to route internet traffic, Advances in Neural Information Processing Systems, 1999.

C. Seifert, P. Komisarczuk, I. Welch, C. U. Aval, and B. Endicott-popovsky, Identification of Malicious Web Pages Through Analysis of Underlying DNS a n d W e b S e r v e r Relationships, 4th IEEE LCN Workshop on Network Security, 2008.

D. Stirling, I. Welch, and P. Komisarczuk, Designing Workflows for Grid Enabled Internet Instruments, 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid (CCGRID), 2008.
DOI : 10.1109/CCGRID.2008.112

A. Bagnasco, A. Poggi, and A. M. Scapolla, A Grid-Based Architecture for the Composition and the Execution of Remote Interactive Measurements, 2006 Second IEEE International Conference on e-Science and Grid Computing (e-Science'06), 2006.
DOI : 10.1109/E-SCIENCE.2006.261055

Y. Yegneswaran, P. Barford, and D. Plonka, On the Design and Use of Internet Sinks for Network Abuse Monitoring, 2004.
DOI : 10.1007/978-3-540-30143-1_8

E. Cooke, M. Bailey, D. Watson, F. Jahanian, and J. Nazario, The Internet Motion Sensor: A distributed global scoped Internet threat monitoring system, 2004.

K. Chard, J. Tan, R. Boverhof, R. Madduri, and I. Foster, Wrap Scientific Applications as WSRF Grid Services Using gRAVI, 2009 IEEE International Conference on Web Services, 2009.
DOI : 10.1109/ICWS.2009.110

C. Seifert, P. Komisarczuk, and I. Welch, Identification of Malicious Web Pages with Static Heuristics, 2008 Australasian Telecommunication Networks and Applications Conference, 2008.
DOI : 10.1109/ATNAC.2008.4783302

J. Nazario, . Usenix, and . Workshop, C : A V i r t u a l C l i e n t H o n e y p o t, p.pdf, 2010.

C. Seifert, P. Komisarczuk, and I. Welch, True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots, 2009 Third International Conference on Emerging Security Information, Systems and Technologies, 2009.
DOI : 10.1109/SECURWARE.2009.17

V. L. Le, P. Komisarczuk, and X. Gao, Applying AI to Improve the Performance of Client Honeypots, the Passive and Active Measurements Conference, 2009.

D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage, Inferring Internet denial-of-service activity, ACM Transactions on Computer Systems, vol.24, issue.2, pp.115-139, 2006.
DOI : 10.1145/1132026.1132027

E. Cooke, M. Bailey, Z. Morley, . Mao, D. Watson et al., Toward understanding distributed blackhole placement, Proceedings of the 2004 ACM workshop on Rapid malcode , WORM '04, pp.54-64, 2004.
DOI : 10.1145/1029618.1029627

U. Harder, M. W. Johnson, J. T. Bradley, and W. J. Knottenbelt, Observing Internet Worm and Virus Attacks with a Small Network Telescope, Proceedings of the 2nd Workshop on Practical Applications of Stochastic Modelling, pp.113-126, 2005.
DOI : 10.1016/j.entcs.2006.03.011

D. Pemberton, An Empirical Study of Internet Background Radiation Arrival Density and Network Telescope Sampling Strategies, 2007.

D. Pemberton, P. Komisarczuk, and I. Welch, Internet background radiation arrival density and network telescope sampling strategies, 2007 Australasian Telecommunication Networks and Applications Conference, 2007.
DOI : 10.1109/ATNAC.2007.4665254