C. Elliott, Botnets: To what extent are they a threat to information security?, Information Security Technical Report, vol.15, issue.3, pp.79-103, 2010.
DOI : 10.1016/j.istr.2010.11.003

S. Ortloff, FAQ: Disabling the new Hlux

M. Kerkers, Characterisation of the Kelihos.B Botnet, 20th Twente Student Conference on IT, 2014.
DOI : 10.1007/978-3-662-43862-6_11

URL : https://hal.archives-ouvertes.fr/hal-01401294

T. Werner, P2P Botnet Kelihos.B with 100.000 Nodes Sinkholed, 2012.

S. Ortloff, Sinkholing the Hlux/Kelihos botnet -what hap- pened? https://www.securelist.com/en/blog, 2013.

H. Binsalleeh, T. Ormerod, A. Boukhtouta, P. Sinha, A. Youssef et al., On the analysis of the Zeus botnet crimeware toolkit, 2010 Eighth International Conference on Privacy, Security and Trust, pp.31-38, 2010.
DOI : 10.1109/PST.2010.5593240

C. Rossow, D. Andriesse, T. Werner, B. Stone-gross, D. Plohmann et al., SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets, 2013 IEEE Symposium on Security and Privacy, pp.97-111, 2013.
DOI : 10.1109/SP.2013.17

T. Werner, Botnet Shutdown Success Story: How Kaspersky Lab Disabled the Hlux/Kelihos Botnet, 2011.

R. Knowles and A. Stevens, How Kaspersky Lab and CrowdStrike Dismantled the Second Hlux/Kelihos Botnet: Success Story, 2012.

A. Raff, Kelihos.B is still live and social. https://www.seculert.com/ blog/2012/03/kelihosb-is-still-live-and-social, 2012.

A. Adamov, A Modification of Kelihos Looks for Passwords Stored in Internet Browsers. http://www.lavasoft.com/mylavasoft/malwaredescriptions/blog/a-modification-of-kelihos-looks-for-passwordsstored-in-internet-browsers, 2013.

R. Ritz, incf.countryutils. https://pypi.python.org/pypi/incf, 2009.

H. Asghari, PyASN 1.2. https://code.google.com, 2010.