M. K. Daly, The Advanced Persistent Threat, USENIX (ed.) 23rd Large Installation System Administration Conference. USENIX, 2009.

A. Juels and T. F. Yen, Sherlock Holmes and The Case of the Advanced Persistent Threat, Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats, pp.2-2, 2012.

D. Winder, Persistent and Evasive Attacks Uncovered, Infosecurity, vol.8, issue.5, pp.40-43, 2011.
DOI : 10.1016/S1754-4548(11)70069-9

S. Liu, Y. Chen, and H. Hung, N-Victims: An Approach to Determine N-Victims for APT Investigations, Lecture Notes in Computer Science, vol.7690, pp.226-240, 2012.
DOI : 10.1007/978-3-642-35416-8_16

S. Institute, http://www.sans.org/reading_room/whitepapers/malicious/detailed-analysis- advanced-persistent-threat-malware_33814

F. Li, A. Lai, and D. Ddl, Evidence of Advanced Persistent Threat: A case study of malware for political espionage, 2011 6th International Conference on Malicious and Unwanted Software, pp.102-109, 2011.
DOI : 10.1109/MALWARE.2011.6112333

S. T. Liu and Y. M. Chen, Retrospective Detection of Malware Attacks by Cloud Computing, International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp.510-517, 2010.

J. Goebel and T. Holz, Rishi: identify bot contaminated hosts by IRC nickname evaluation, Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, pp.8-8, 2007.

J. Brustoloni, N. Farnan, R. Villamarin-salomon, and D. Kyle, Efficient Detection of Bots in Subscribers' Computers, 2009 IEEE International Conference on Communications, pp.1-6, 2009.
DOI : 10.1109/ICC.2009.5198970

K. Rieck, G. Schwenk, T. Limmer, T. Holz, and P. Laskov, Botzilla, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, pp.1978-1984, 2010.
DOI : 10.1145/1774088.1774506

M. Warmer, Detection of web based command & control channels, Mathematics and Computer Science. University of TWENTE, 2011.

R. Perdisci, W. Lee, and N. Feamster, Behavioral clustering of HTTP-based malware and signature generation using malicious network traces, Proceedings of the 7th USENIX conference on Networked systems design and implementation, pp.26-26, 2010.

G. Gu, J. Zhang, and W. Lee, BotSniffer: Detecting botnet command and control channels in network traffic, Proceedings of the 15th Annual Network and Distributed System Security Symposium, 2008.

R. E. Larson, CCSP: Cisco Certified Security Professional Certification All-in-One Exam Guide, 2003.

O. Thonnard, L. Bilge, G. O-'gorman, S. Kiernan, and M. Lee, Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat, Lecture Notes in Computer Science, vol.7462, pp.64-85, 2012.
DOI : 10.1007/978-3-642-33338-5_4

A. Sood and R. Enbody, Targeted Cyber Attacks - A Superset of Advanced Persistent Threats, IEEE Security & Privacy Magazine, vol.99, pp.1-3, 2012.
DOI : 10.1109/MSP.2012.90

A. Sood, R. Enbody, and R. Bansal, Cybercrime: Dissecting the State of Underground Enterprise, IEEE Internet Computing, vol.17, issue.1, pp.1-1, 2012.
DOI : 10.1109/MIC.2012.61

E. Baize, Developing Secure Products in the Age of Advanced Persistent Threats, IEEE Security & Privacy Magazine, vol.10, issue.3, pp.88-92, 2012.
DOI : 10.1109/MSP.2012.65

C. Tankard, Advanced Persistent threats and how to monitor and deter them, Network Security, vol.2011, issue.8, pp.16-19, 2011.
DOI : 10.1016/S1353-4858(11)70086-1

T. Gordon, APTs: a poorly understood challenge, Network Security, vol.2011, pp.9-11, 2011.

J. Dean and S. Ghemawat, MapReduce, Communications of the ACM, vol.51, issue.1, pp.107-113, 2008.
DOI : 10.1145/1327452.1327492