P. Barford and M. Blodgett, Toward botnet mesocosms, Proc. 1 st Work. on Hot Topics in Understanding Botnets (HotBots), 2007.

T. Benzel, R. Braden, D. Kim, C. Neuman, A. Joseph et al., Experience with deter: a testbed for security research, 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. TRIDENTCOM 2006., 2006.
DOI : 10.1109/TRIDNT.2006.1649172

P. Bureau and J. Fernandez, Optimising Networks Against Malware, 2007 IEEE International Performance, Computing, and Communications Conference, 2007.
DOI : 10.1109/PCCC.2007.358935

J. Calvet, C. Davis, and P. Bureau, Malware authors don't learn, and that's good!, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE), 2009.
DOI : 10.1109/MALWARE.2009.5403013

J. Calvet, C. Davis, J. Fernandez, W. Guizani, M. Kaczmarek et al., Isolated virtualised clusters: testbeds for high-security experimentation and training, Proc. 3 rd USENIX Work. on Cyber Sec. Experimentation and Test (CSET), 2010.
URL : https://hal.archives-ouvertes.fr/inria-00536712

E. Cooke, F. Jahanian, and D. Mcpherson, The zombie roundup: Understanding, detecting, and disrupting botnets, Proc. Work. on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), 2005.

D. Dagon, G. Gu, C. Zou, J. Grizzard, S. Dwivedi et al., A taxonomy of botnets, Proc. of CAIDA DNS-OARC Work, 2005.

D. Dagon, C. Zou, and W. Lee, Modeling botnet propagation using time zones, Proc. 13 th Network and Distributed System Security Symp. (NDSS), 2006.

C. Davis, J. Fernandez, and S. Neville, Optimising sybil attacks against P2P-based botnets, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE), 2009.
DOI : 10.1109/MALWARE.2009.5403016

C. Davis, J. Fernandez, S. Neville, and J. Mchugh, Sybil attacks as a mitigation strategy against the Storm botnet, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE), 2008.
DOI : 10.1109/MALWARE.2008.4690855

C. Davis, S. Neville, J. Fernandez, J. Robert, and J. Mchugh, Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?, Proc. 13 th European Symp. on Research in Computer Security (ESORICS), 2008.
DOI : 10.1103/PhysRevE.65.056109

S. Gaudin, Storm botnet puts up defenses and starts attacking back, 2007.

A. Jackson, D. Lapsley, C. Jones, M. Zatko, C. Golubitsky et al., SLINGbot: A System for Live Investigation of Next Generation Botnets, 2009 Cybersecurity Applications & Technology Conference for Homeland Security, 2009.
DOI : 10.1109/CATCH.2009.26

J. John, A. Moshchuk, S. Gribble, and A. Krishnamurthy, Studying spamming botnets using botlab, Proc. 6 th USENIX Symp. on Networked Systems Designs and Implementation (NSDI), 2009.

C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker et al., Spamalytics: an empirical analysis of spam marketing conversion, Proc. 15 th ACM Conf. Comp. & Comm. Security (CCS), 2008.

C. Kanich, K. Levchenko, B. Enright, G. Voelker, and S. Savage, The Heisenbot uncertainty problem: Challenges in separating bots from chaff, Proc. 1 st USENIX Work. Large-Scale Exploits & Emergent Threats (LEET), 2008.

L. Peterson and T. Roscoe, The design principles of PlanetLab, ACM SIGOPS Operating Systems Review, vol.40, issue.1, pp.11-16, 2006.
DOI : 10.1145/1113361.1113367

M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, A multifaceted approach to understanding the botnet phenomenon, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006.
DOI : 10.1145/1177080.1177086

E. Ruitenbeek and W. Sanders, Modeling Peer-to-Peer Botnets, 2008 Fifth International Conference on Quantitative Evaluation of Systems, pp.307-316, 2008.
DOI : 10.1109/QEST.2008.43

G. Sinclair, C. Nunnery, and B. Kang, The waledac protocol: The how and why, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE), 2009.
DOI : 10.1109/MALWARE.2009.5403015

J. Stewart, Storm worm DDoS attack. http://www.secureworks.com/research/ threats/storm-worm, Feb, 2007.

B. Stock, J. Goebel, M. Engelberth, F. Freiling, and T. Holz, Walowdac - Analysis of a Peer-to-Peer Botnet, 2009 European Conference on Computer Network Defense, 2009.
DOI : 10.1109/EC2ND.2009.10

P. Wang, S. Sparks, and C. C. Zou, An Advanced Hybrid Peer-to-Peer Botnet, Proc. 1 st Work. on Hot Topics in Understanding Botnets (HotBots), 2007.
DOI : 10.1109/TDSC.2008.35

B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad et al., An integrated experimental environment for distributed systems and networks, Proc. of 5 th Symp. on Operating systems design and implementation (OSDI), pp.255-270, 2002.

Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu et al., Botgraph: Large scale spamming botnet detection, Proc. 6 th USENIX Symp. on Networked Systems Designs and Implementation (NSDI), 2009.