Identification of Bot Commands by Run-Time Execution Monitoring, 2009 Annual Computer Security Applications Conference, pp.321-330, 2009. ,
DOI : 10.1109/ACSAC.2009.37
Characterizing Bots Remote Control Behavior, 2007. ,
DOI : 10.1007/978-3-540-73614-1_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.9155
BotTracer: Execution-Based Bot-Like Malware Detection, international conference on Information Security, 2008. ,
DOI : 10.1007/978-3-540-85886-7_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.9
Friends of An Enemy: Identifying Local Members of Peer-to-Peer Botnets Using Mutual Contacts, 2010. ,
BotGrep: Finding P2P bots with structured graph analysis, USENIX Security Conference, 2010. ,
Detection of Botnets Using Combined Host-and Network-Level Information, 2010. ,
BotTracer: Execution-Based Bot-Like Malware Detection, Information Security(ISC), 2008. ,
DOI : 10.1007/978-3-540-85886-7_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.9
Carsten Willems Automatic analysis of malware behavior using machine learning, Journal of Computer Security, vol.19, issue.4, 2011. ,
Semantic Malware Detection by Deploying Graph Mining, International Journal of Computer Science Issues, vol.9, issue.1 3, 2012. ,
BotFinder, Proceedings of the 8th international conference on Emerging networking experiments and technologies, CoNEXT '12, 2012. ,
DOI : 10.1145/2413176.2413217
Disclosure, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, 2012. ,
DOI : 10.1145/2420950.2420969
BotTrack: Tracking Botnets Using NetFlow and PageRank, In IFIP Networking, 2011. ,
DOI : 10.1007/978-3-642-20757-0_1
URL : https://hal.archives-ouvertes.fr/inria-00613597
Correlation-based Botnet Detection in Enterprise Networks, GIT, 2008. ,
Modeling High-Level Behavior Patterns for Precise Similarity Analysis of Software, 2011 IEEE 11th International Conference on Data Mining, pp.2010-2026, 2010. ,
DOI : 10.1109/ICDM.2011.104
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self, ISC, 2010. ,
DOI : 10.1007/978-3-642-18178-8_15
On Clustering Validation Techniques, JIIS, vol.17, issue.2-3, pp.107-145, 2001. ,