Y. Park and D. S. Reeves, Identification of Bot Commands by Run-Time Execution Monitoring, 2009 Annual Computer Security Applications Conference, pp.321-330, 2009.
DOI : 10.1109/ACSAC.2009.37

. E. Stinson and . J. Mitchell, Characterizing Bots Remote Control Behavior, 2007.
DOI : 10.1007/978-3-540-73614-1_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.9155

L. Liu, S. Chen, G. Yan, and Z. Zhang, BotTracer: Execution-Based Bot-Like Malware Detection, international conference on Information Security, 2008.
DOI : 10.1007/978-3-540-85886-7_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.9

S. Baris-coskun, N. Dietrich, and . Memon, Friends of An Enemy: Identifying Local Members of Peer-to-Peer Botnets Using Mutual Contacts, 2010.

S. Nagaraja, P. Mittal, C. Hong, M. Caesar, and N. Borisov, BotGrep: Finding P2P bots with structured graph analysis, USENIX Security Conference, 2010.

Y. Zeng, X. Hu, and K. G. Shin, Detection of Botnets Using Combined Host-and Network-Level Information, 2010.

L. Liu, S. Chen, G. Yan, and Z. Zhang, BotTracer: Execution-Based Bot-Like Malware Detection, Information Security(ISC), 2008.
DOI : 10.1007/978-3-540-85886-7_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.9

K. Rieck and P. Trinius, Carsten Willems Automatic analysis of malware behavior using machine learning, Journal of Computer Security, vol.19, issue.4, 2011.

F. Karbalaie, A. Sami, and M. Ahmadi, Semantic Malware Detection by Deploying Graph Mining, International Journal of Computer Science Issues, vol.9, issue.1 3, 2012.

F. Tegeler, X. Fu, G. Vigna, and C. Kruegel, BotFinder, Proceedings of the 8th international conference on Emerging networking experiments and technologies, CoNEXT '12, 2012.
DOI : 10.1145/2413176.2413217

L. Bilge, D. Balzarotti, and W. Robertson, Disclosure, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, 2012.
DOI : 10.1145/2420950.2420969

J. Francois, S. Wang, R. State, and T. Engel, BotTrack: Tracking Botnets Using NetFlow and PageRank, In IFIP Networking, 2011.
DOI : 10.1007/978-3-642-20757-0_1

URL : https://hal.archives-ouvertes.fr/inria-00613597

G. Gu, Correlation-based Botnet Detection in Enterprise Networks, GIT, 2008.

T. Kwon and Z. Su, Modeling High-Level Behavior Patterns for Precise Similarity Analysis of Software, 2011 IEEE 11th International Conference on Data Mining, pp.2010-2026, 2010.
DOI : 10.1109/ICDM.2011.104

X. Wang and X. Jiang, Artificial Malware Immunization Based on Dynamically Assigned Sense of Self, ISC, 2010.
DOI : 10.1007/978-3-642-18178-8_15

M. Halkidi, Y. Batistakis, and M. Vazirgiannis, On Clustering Validation Techniques, JIIS, vol.17, issue.2-3, pp.107-145, 2001.