5 papers:
- CSCW-2015-AbokhodairYM #social #twitter
- Dissecting a Social Botnet: Growth, Content and Influence in Twitter (NA, DY, DWM), pp. 839–851.
- SAC-2014-ZandVYK #detection
- Extracting probable command and control signatures for detecting botnets (AZ, GV, XY, CK), pp. 1657–1662.
- ICML-2012-HaiderS #clustering #graph #using
- Finding Botnets Using Minimal Graph Clusterings (PH, TS), p. 37.
- ICSM-2011-Kemmerer #how #what
- How to steal a botnet and what can happen when you do (RAK), p. 1.
- ICEIS-v3-2011-LuLC #hybrid
- An Advanced Hybrid P2P Botnet 2.0 (TTL, HYL, MFC), pp. 273–276.