References
- Markoff, John, "Attack of the zombie computers is a growing threat, experts say," New York Times, 157, 1-3, 2007.
- Zhuang, Li, et al, "Characterizing Botnets from Email Spam Records," LEET, 8, 1-9, 2008.
- John, John P., et al, "Studying Spamming Botnets Using Botlab," NSDI, Vol. 9, 2009.
- Zhao, Yao, et al, "BotGraph: Large Scale Spamming Botnet Detection," NSDI, Vol. 9, 2009.
- Xie, Yinglian, et al, "Spamming botnets: signatures and characteristics," ACM SIGCOMM Computer Communication Review, 38.4, 171-182, 2008. https://doi.org/10.1145/1402946.1402979
- Thomas, Kurt, et al, "Suspended accounts in retrospect: an analysis of twitter spam," in Proc. of Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM, 2011.
- Ramachandran, Anirudh, and Nick Feamster, "Understanding the network-level behavior of spammers," in Proc. of ACM SIGCOMM Computer Communication Review, Vol. 36, No. 4, ACM, 2006.
- Berkhin, Pavel, Zoltan Istvan Gyongyi, and Jan Pedersen, "Link-based spam detection," U.S. Patent, No. 7, 533,092. 12 May 2009.
- Becchetti, Luca, et al, "Link analysis for web spam detection," ACM Transactions.
- Han, K. S., Y. H. Shin, and E. G. Im, "A study of spam-spread malware analysis and countermeasure framework," Journal of Security Engineering, 7.4, 363-383, 2010.
- Lin, Kuan-Cheng, Sih-Yang Chen, and Jason C. Hung, "Botnet detection using support vector machines with artificial fish swarm algorithm," Journal of Applied Mathematics 2014, 2014.
- Akinyelu, Andronicus A., and Aderemi O. Adewumi, "Classification of phishing email using random forest machine learning technique," Journal of Applied Mathematics 2014, 2014.
- Chiang, Ken, and Levi Lloyd, "A Case Study of the Rustock Rootkit and Spam Bot," HotBots, 7, 10-10, 2007.
- Duan, Zhenhai, Kartik Gopalan, and Xin Yuan, "Behavioral Characteristics of Spammers and Their Network Reachability Properties," ICC, Vol. 7, 2007.
- Qaroush, Aziz, Ismail M. Khater, and Mahdi Washaha, "Identifying spam e-mail based-on statistical header features and sender behavior," in Proc. of Proceedings of the CUBE International Information Technology Conference. ACM, 2012.
- Al-Jarrah, Omar, Ismail Khater, and Basheer Al-Duwairi, "Identifying potentially useful email header features for email spam filtering," in Proc. of The Sixth International Conference on Digital Society (ICDS), 2012.
- A. C. Solutions. January 7, 2011 Statistics and Facts About Spam.Retrieved: July, 2011.
- Sanchez, Fernando, Zhenhai Duan, and Yingfei Dong, "Understanding forgery properties of spam delivery paths," in Proc. of Proceedings of 7th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS), 2010.
- Hu, Yong, et al, "A scalable intelligent non-content-based spam-filtering framework," Expert Systems with Applications, 37.12, 8557-8565, 2010. https://doi.org/10.1016/j.eswa.2010.05.020
- Duan, Zhenhai, et al. "Detecting spam zombies by monitoring outgoing messages," IEEE Transactions on dependable and secure computing, 9.2, 198-210, 2012. https://doi.org/10.1109/TDSC.2011.49
- Wang, Chih-Chien, and Sheng-Yi Chen, "Using header session messages to anti-spamming," Computers & Security, 26.5, 381-390, 2007. https://doi.org/10.1016/j.cose.2006.12.012
- Jeong, Hyun-Cheol, et al, "Study for tracing zombie pcs and botnet using an email spam trap," Journal of the Korea Institute of Information Security and Cryptology, 21.3, 101-115, 2011.
- Jeong, HyunCheol, et al, "Detection of Zombie PCs Based on Email Spam Analysis," KSII Transactions on Internet & Information Systems, 6.5, 2012.
- Huang, Lin, et al, "Using reputation measurement to defend mobile social networks against malicious feedback ratings," The Journal of Supercomputing, 71.6, 2190-2203, 2015. https://doi.org/10.1007/s11227-015-1432-x
- Lee, et al, "Detection of malware propagation in sensor Node and botnet group clustering based on e-mail spam analysis," International Journal of Distributed Sensor Networks 2015, 15, 2015.
- Kaspersky, http://www.kaspersky.com
- Symantec. http://www.symantec.com
- KISA. http://www.kisa.or.kr
- KISA RBL. https://www.kisarbl.or.kr/
- https://www.spamhaus.org/