[1] 金双民,郑辉,段海新. 僵尸网络研究概述[J]. 中国教育网络,2006,6:51-54.
[2] 僵尸挖矿威胁全球网络安全 .p2pbucks
[3] PsyBoG: A Scalable Botnet Detection Method for Large-scale DNS Traffic[J] . Jonghoon Kwon,Jehyun Lee,Heejo Lee,Adrian Perrig. Computer Networks . 2015
[4] Semantic analysis and retrieval of spatial data based on the uncertain ontology model in Digital Earth[J] . Shengtao Sun,Lizhe Wang,Rajiv Ranjan,Aizhi Wu. International Journal of Digital Earth . 2015 (1)
[5] Detecting P2P bots by mining the regional periodicity[J]. Yong QIAO,Yue-xiang YANG,Jie HE,Chuan TANG,Ying-zhi ZENG. Journal of Zhejiang University-Science C(Computers & Electronics). 2013(09)
[6] DFBotKiller: Domain-flux botnet detection based on the history of group activities and failures in DNS traffic[J] . Reza Sharifnya,Mahdi Abadi. Digital Investigation . 2014
[7] Identifying botnets by capturing group activities in DNS traffic[J] . Hyunsang Choi,Heejo Lee. Computer Networks . 2011 (1)
[8] Hybrid continuous speech recognition systems by HMM, MLP and SVM: a comparative study[J] . Elyes Zarrouk,Yassine Ben Ayed,Faiez Gargouri. International Journal of Speech Technology . 2014 (3)
[9] Exposure[J] . Leyla Bilge,Sevil Sen,Davide Balzarotti,Engin Kirda,Christopher Kruegel. ACM Transactions on Information and System Security (TISSEC) . 2014 (4)
[10] 基于行为分析的僵尸网络对抗技术研究[D]. 李可.北京邮电大学 2017