H. Binsalleeh, On the Analysis of the Zeus Botnet Crimeware Toolkit, National Cyber Forensics and Training Alliance Canada, 2010.
 H. R. Zeidanloo, A. A. Manaf, "Botnet command and control mechanisms," In the proc. of Second International Conference on Computer and Electrical Engineering, (ICCEE '09), pp. 564-568, 2009.
 Paul Barford, Vinod Yegneswaran, An Inside Look at Botnets, Computer Sciences DepartmentUniversity of Wisconsin, Madison, 2006.
 C. Douligeris and D. N. Serpanos, "Network security: current status and future directions," Wiley-IEEE Press, 2007.
 B. B. Gupta, M. Misra, R. C. Joshi, ―FVBA: A Combined Statistical Approach for Low Rate Degrading and High Bandwidth Disruptive DDoS Attacks Detection in ISP Domain, In the proceedings of 16th IEEE International Conference on Networks (ICON-2008), DOI: 10.1109/ICON.2008.4772654, New Delhi, India, 2008.
 D. Dagon, G. Gu, C. P. Lee, and W. Lee, “A Taxonomy of Botnet Structures,” In the Proc. of ACSAC 2007, Miami, FL, USA.
 S. Kandula, D. Katabi, M. Jacob, and A. Burger, “Botz-4Sale: Surviving DDos Attacks that Mimic Flash Crowds,” inProc. USENIX NSDI 2005. Boston, MA, May 2005.
 Al-Duwairi B, Manimaran G (2009) JUST-Google: A search engine-based defense against botnet-based DDoS attacks. IEEE International Conference on Communications (ICC '09).
 C. Dixon, T. Anderson and A. Krishnamurthy, “Phalanx: Withstanding Multimillion-Node Botnets,”In Proc. Of NDSI 2008.
 D. McPherson, ―Worldwide Infrastructure Security Report," Arbor Networks, January 19th, 2010, avilable at: http://ipv6.org.sa/sites/default/files/World_Infrastructure_Security_Report_2011.pdf.
 Eli Tilevich, Yannis Smaragdakis, “Appletizing: Running Legacy Java Code Remotely From a Web Browser”, International Conference on Software Maintenance and Evolution (ICSME), 2005.
 Ari Juels, Markus Jakobsson, “Cache Cookies for Browser Authentication”, Security and Privacy, 2006 IEEE Symposium on , May 2006.
 Stefan Frei, Thomas Duebendorfer, “Understanding the Web browser threat: Examination of vulnerable online Web browser populations and the "insecurity iceberg", 2008.
 Ahmad Mudhar, “Evaluation of the CSF Firewall”, 2013.
 Laura Chappell, “Wireshark Network Analysis, The Official Wireshark Certified Network Analyst Study Guide”, 2009