M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster, Building a dynamic reputation system for DNS, Proceedings of the 19th USENIX Security Symposium (Secu- rity'10). USENIX Association, 2010.

H. Choi and H. Lee, Identifying botnets by capturing group activities in DNS traffic, Computer Networks, vol.56, issue.1, pp.20-33, 2011.
DOI : 10.1016/j.comnet.2011.07.018

F. Cuppens and A. Mì-ege, Alert correlation in a cooperative intrusion detection framework, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.202-215, 2002.
DOI : 10.1109/SECPRI.2002.1004372

A. Flaglien, K. Franke, and A. Arnes, Identifying Malware Using Cross-Evidence Correlation
DOI : 10.1007/978-3-642-24212-0_13

J. Goebel and T. Holz, Rishi: Identifying bot-contaminated hosts by IRC nickname evaluation, HotBots'07: Proceedings of the First USENIX Workshop on Hot Topics in Understanding Botnets, 2007.

J. B. Grizzard, V. Sharma, C. Nunnery, B. B. Kang, and D. Dagon, Peer-to-peer botnets; Overview and case study, HotBots'07: Proceedings of the First USENIX Workshop on Hot Topics in Understanding Botnets, 2007.

G. Gu, J. Zhang, and W. Lee, BotSniffer: Detecting botnet command and control channels in network traffic, NDSS'08: Proceedings of the 15th Annual Network and Distributed System Security Symposium, 2008.

G. Gu, R. Perdisci, J. Zhang, and W. Lee, Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection, Proceedings of the 17th conference on Security symposium, pp.139-154, 2008.

G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, BotHunter: Detecting malware infection through IDS-driven dialog correlation, Proceedings of the 16th USENIX Security Symposium, pp.167-182, 2007.

G. Hogben, Botnets: Detection, measurement, disinfection and defence, Tech. rep, 2011.

C. Jensen and T. Korsgaard, Dynamics of trust evolution: Auto-configuration of disposiional trust dynamics, Proceedings of the International Conference on Security and Cryptography, pp.509-517, 2008.

A. Karasaridis, B. Rexroad, and D. Hoeflin, Wide-scale botnet detection and characterization, HotBots'07: Proceedings of the First USENIX Workshop on Hot Topics in Understanding Botnets, 2007.

W. Lu, G. Rammidi, and A. A. Ghorbani, Clustering botnet communication traffic based on n-gram feature selection, Computer Communications, vol.34, issue.3, pp.502-514, 2011.
DOI : 10.1016/j.comcom.2010.04.007

S. Marsh, Formalizing Trust as a Computational Concept, 1994.

M. Masud, T. Al-khateeb, L. Khan, B. Turaisingham, and K. Hamlen, Flow-based identification of botnet traffic by mining multiple log files, 2008 First International Conference on Distributed Framework and Applications, 2008.
DOI : 10.1109/ICDFMA.2008.4784437

P. Ning, Y. Cui, and D. S. Reeves, Constructing attack scenarios through correlation of intrusion alerts, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.245-254, 2002.
DOI : 10.1145/586110.586144

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.331.3790

A. J. Oliner, A. V. Kulkarni, and A. Aiken, Community Epidemic Detection Using Time-Correlated Anomalies, 6307 in Lecture Notes in Computer Science, pp.360-381, 2010.
DOI : 10.1007/978-3-642-15512-3_19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.167.4701

P. Porras, H. Saidi, and V. Yegneswaran, A multi-perspective analysis of the Storm (peacomm) worm, Tech. rep., SRI International, 2007.

P. Porras, H. Saidi, and V. Yegneswaran, Conficker C analysis, available online, 2009.

A. Ramachandran, N. Feamster, and D. Dagon, Revealing botnet membership using DNSBL counter-intelligence, SRUTI'06: Proceedings of the 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, pp.49-54, 2006.
DOI : 10.1007/978-0-387-68768-1_7

M. Roesch, Snort ? lightweight intrusion detection for networks, Proceedings of Usenix LISA'99. USENIX Association, 1999.

S. Saad, I. Traore, A. Ghorbani, B. Sayed, D. Zhao et al., Detecting P2P botnets through network behavior analysis and machine learning, 2011 Ninth Annual International Conference on Privacy, Security and Trust, 2011.
DOI : 10.1109/PST.2011.5971980

S. Setia, S. Roy, and S. Jajodia, Secure data aggregation in wireless sensor networks, Wireless Sensor Networks Security, 2008.

S. Shin, Z. Xu, and G. Gu, EFFORT: Efficient and effective bot malware detection, Proceedings of 31st Annual IEEE Conference on Computer Communications (INFOCOM'12), 2012.

G. Sinclair, C. Nunnery, and B. B. Kang, The waledac protocol: The how and why, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE), 2009.
DOI : 10.1109/MALWARE.2009.5403015

E. Stinson and J. C. Mitchell, Characterizing bots' remote control behavior, Botnet Detection, Advances in Information Security, pp.45-64, 2008.
DOI : 10.1007/978-3-540-73614-1_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.9155

W. T. Strayer, D. Lapsely, R. Walsh, and C. Livadas, Botnet detection based on network behaviour, Botnet Detection, Advances in Information Security, pp.1-24, 2008.

S. Inc, Symantec global internet security threat report, trends for 2010, Security Report XVI, Symantec Inc, 2011.

S. Inc, Counterclank bot, available online, pp.2012-012709, 2012.

R. Villamarin-salomon and J. Brustoloni, Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic, 2008 5th IEEE Consumer Communications and Networking Conference, pp.476-481, 2008.
DOI : 10.1109/ccnc08.2007.112

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.1318

H. Wang and Z. Gong, Collaboration-based Botnet Detection Architecture, 2009 Second International Conference on Intelligent Computation Technology and Automation, 2009.
DOI : 10.1109/ICICTA.2009.326

H. Wang, J. Hou, and Z. Gong, Botnet detection architecture based on heterogeneous multisensor information fusion, Journal of Networks, vol.6, issue.12, pp.1655-1661, 2011.
DOI : 10.4304/jnw.6.12.1655-1661

P. Wang, S. Sparks, and C. C. Zou, An Advanced Hybrid Peer-to-Peer Botnet, HotBots'07: Proceedings of the First USENIX Workshop on Hot Topics in Understanding Botnets, 2007.
DOI : 10.1109/TDSC.2008.35

J. Weng, C. Miao, and A. Goh, Improving collaborative filtering with trust-based metrics, Proceedings of the 2006 ACM symposium on Applied computing , SAC '06, pp.1860-1864, 2006.
DOI : 10.1145/1141277.1141717

Y. Zeng, X. Hu, and K. G. Shin, Detection of botnets using combined host-and network-level information, Proceedings of 40th International Conference on Dependable Systems and Networks (DSN), 2010.

J. Zhang, R. Perdisci, W. Lee, U. Sarfraz, and X. Luo, Detecting stealthy P2P botnets using statistical traffic fingerprints, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN), pp.121-132, 2011.
DOI : 10.1109/DSN.2011.5958212

Y. Zhang, N. Meratnia, and P. Havinga, Outlier Detection Techniques for Wireless Sensor Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.12, issue.2, 2010.
DOI : 10.1109/SURV.2010.021510.00088