M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster, Building a dynamic reputation system for dns, Usenix Security Symposium, 2010.

M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou, S. Abu-nimeh et al., From throw-away traffic to bots: Detecting the rise of dga-based malware, USENIX Security Symposium, 2012.

D. Balzarotti, M. Cova, C. Karlberger, C. Kruegel, E. Kirda et al., Efficient detection of split personalities in malware, International Symposium on Network and Distributed System Security (NDSS), 2010.

L. Bilge, D. Balzarotti, W. Robertson, E. Kirda, and C. Kruegel, Disclosure, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, 2012.
DOI : 10.1145/2420950.2420969

L. Bilge, E. Kirda, C. Kruegel, and M. Balduzzi, Exposure, Symposium on Network and Distributed System Security, 2011.
DOI : 10.1145/2584679

H. Choi, H. Lee, H. Lee, and H. Kim, Botnet Detection by Monitoring Group Activities in DNS Traffic, 7th IEEE International Conference on Computer and Information Technology (CIT 2007), 2007.
DOI : 10.1109/CIT.2007.90

N. Cristianini and J. Shawe-taylor, An introduction to support vector machines and other kernel-based learning methods, 2000.
DOI : 10.1017/CBO9780511801389

M. Felegyhazi, C. Kreibich, and V. Paxson, On the potential of proactive domain blacklisting, Third USENIX LEET Workshop, 2010.

T. Holz, C. Gorecki, K. Rieck, and F. C. Freiling, Measuring and detecting fast-flux service networks, Symp. on Network and Distributed System Security, 2008.

G. Jacob, R. Hund, C. Kruegel, and T. Holz, Jackstraws: Picking command and control connections from bot traffic, USENIX Security Symposium, 2011.

N. Kheir and X. Han, PeerViewer: Behavioral Tracking and Classification of P2P Malware, 5th Int. Symposium on Cyberspace Safety and Security (CSS), 2013.
DOI : 10.1007/978-3-319-03584-0_21

N. Kheir and C. Wolley, BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis, 12th Int. Conf. Cryptology and Network Security (CANS), 2013.
DOI : 10.1007/978-3-319-02937-5_9

P. Langley and S. Sage, Induction of Selective Bayesian Classifiers, 10th international conference on Uncertainty in artificial intelligence, pp.399-406, 1994.
DOI : 10.1016/B978-1-55860-332-5.50055-9

P. Mockapetris, Dns encoding of network names and other types, RFC, vol.1101, 1989.
DOI : 10.17487/rfc1101

A. Moser, C. Kruegel, and E. Kirda, Exploring Multiple Execution Paths for Malware Analysis, 2007 IEEE Symposium on Security and Privacy (SP '07), 2007.
DOI : 10.1109/SP.2007.17

J. R. Quinlan, C4.5: Programs for machine learning, 1993.

M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, A multifaceted approach to understanding the botnet phenomenon, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006.
DOI : 10.1145/1177080.1177086

S. Sinha, M. Bailey, and F. Jahanian, Shades of grey: On the effectiveness of reputation-based " blacklists, International Conference on Malicious and Unwared Software (Malware), 2008.

P. Wurzinger, L. Bilge, T. Holz, J. Goebel, C. Kruegel et al., Automatically Generating Models for Botnet Detection, 14th European Symposium on Research in Computer Security (ESORICS), 2009.
DOI : 10.1007/978-3-540-70542-0_6

S. Yadav, A. K. Reddy, A. N. Reddy, and S. Ranjan, Detecting algorithmically generated malicious domain names, Proceedings of the 10th annual conference on Internet measurement, IMC '10, 2010.
DOI : 10.1145/1879141.1879148