Toward botnet mesocosms, Proc. 1 st Work. on Hot Topics in Understanding Botnets (HotBots), 2007. ,
Experience with deter: a testbed for security research, 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. TRIDENTCOM 2006., 2006. ,
DOI : 10.1109/TRIDNT.2006.1649172
Optimising Networks Against Malware, 2007 IEEE International Performance, Computing, and Communications Conference, 2007. ,
DOI : 10.1109/PCCC.2007.358935
Malware authors don't learn, and that's good!, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE), 2009. ,
DOI : 10.1109/MALWARE.2009.5403013
Isolated virtualised clusters: testbeds for high-security experimentation and training, Proc. 3 rd USENIX Work. on Cyber Sec. Experimentation and Test (CSET), 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00536712
The zombie roundup: Understanding, detecting, and disrupting botnets, Proc. Work. on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), 2005. ,
A taxonomy of botnets, Proc. of CAIDA DNS-OARC Work, 2005. ,
Modeling botnet propagation using time zones, Proc. 13 th Network and Distributed System Security Symp. (NDSS), 2006. ,
Optimising sybil attacks against P2P-based botnets, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE), 2009. ,
DOI : 10.1109/MALWARE.2009.5403016
Sybil attacks as a mitigation strategy against the Storm botnet, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE), 2008. ,
DOI : 10.1109/MALWARE.2008.4690855
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?, Proc. 13 th European Symp. on Research in Computer Security (ESORICS), 2008. ,
DOI : 10.1103/PhysRevE.65.056109
Storm botnet puts up defenses and starts attacking back, 2007. ,
SLINGbot: A System for Live Investigation of Next Generation Botnets, 2009 Cybersecurity Applications & Technology Conference for Homeland Security, 2009. ,
DOI : 10.1109/CATCH.2009.26
Studying spamming botnets using botlab, Proc. 6 th USENIX Symp. on Networked Systems Designs and Implementation (NSDI), 2009. ,
Spamalytics: an empirical analysis of spam marketing conversion, Proc. 15 th ACM Conf. Comp. & Comm. Security (CCS), 2008. ,
The Heisenbot uncertainty problem: Challenges in separating bots from chaff, Proc. 1 st USENIX Work. Large-Scale Exploits & Emergent Threats (LEET), 2008. ,
The design principles of PlanetLab, ACM SIGOPS Operating Systems Review, vol.40, issue.1, pp.11-16, 2006. ,
DOI : 10.1145/1113361.1113367
A multifaceted approach to understanding the botnet phenomenon, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006. ,
DOI : 10.1145/1177080.1177086
Modeling Peer-to-Peer Botnets, 2008 Fifth International Conference on Quantitative Evaluation of Systems, pp.307-316, 2008. ,
DOI : 10.1109/QEST.2008.43
The waledac protocol: The how and why, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE), 2009. ,
DOI : 10.1109/MALWARE.2009.5403015
Storm worm DDoS attack. http://www.secureworks.com/research/ threats/storm-worm, Feb, 2007. ,
Walowdac - Analysis of a Peer-to-Peer Botnet, 2009 European Conference on Computer Network Defense, 2009. ,
DOI : 10.1109/EC2ND.2009.10
An Advanced Hybrid Peer-to-Peer Botnet, Proc. 1 st Work. on Hot Topics in Understanding Botnets (HotBots), 2007. ,
DOI : 10.1109/TDSC.2008.35
An integrated experimental environment for distributed systems and networks, Proc. of 5 th Symp. on Operating systems design and implementation (OSDI), pp.255-270, 2002. ,
Botgraph: Large scale spamming botnet detection, Proc. 6 th USENIX Symp. on Networked Systems Designs and Implementation (NSDI), 2009. ,