1 |
Sergio S.C. Silva, Rodrigo M.P. Silva, Raquel C.G. Pinto, Ronaldo M. Salles, "Botnets: A survey", Computer Networks, Vol. 57, No. 2, pp. 378-403, 2013. https://doi.org/10.1016/j.comnet.2012.07.021
DOI
|
2 |
L. Bock, N. Alexopoulos, E. Saracoglu, M. Muhlhauser and E. Vasilomanolakis, "Assessing the Threat of Blockchain-based Botnets", 2019 APWG Symposium on Electronic Crime Research (eCrime), pp. 1-11, 2019. https://doi.org/10.1109/eCrime47957.2019.9037600
DOI
|
3 |
Ali, S.T., McCorry, P., Lee, P.HJ. et al., "ZombieCoin 2.0: managing next-generation botnets using Bitcoin" International Journal of Information Security, Vol. 17, No. 4, pp. 411-422, 2018. https://doi.org/10.1007/s10207-017-0379-8
DOI
|
4 |
Nakamoto Satoshi, "Bitcoin: A peer-to-peer electronic cash system", Decentralized Business Review, 2008.
|
5 |
Korea 4th Industrial Revolution Committee Resolution, "「Blockchain Technology Expansion Strategy」 for a hyper-connected and non-face-to-face trust society", 2020. https://www.4th-ir.go.kr/article/detail/1142
|
6 |
M. Bailey, E. Cooke, F. Jahanian, Y. Xu and M. Karir "A Survey of Botnet Technology and Defenses", 2009 Cybersecurity Applications & Technology Conference for Homeland Security, pp. 299-304, 2009. https://doi.org/10.1109/CATCH.2009.40
DOI
|
7 |
B.H, Kang, et al., "Towards complete node enumeration in a peerto-peer botnet", Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 23-34, 2009. https://doi.org/10.1145/1533057.1533064
DOI
|
8 |
Jaewoo Jeon, and Youngho Cho, "Construction and Performance Analysis of Image Steganography-Based Botnet in KakaoTalk Openchat", Computers, 8(3), 61, 2019. https://doi.org/10.3390/computers8030061
DOI
|
9 |
https://bitnodes.io/
|
10 |
Bartoletti, M. and Pompianu, L., "An Analysis of Bitcoin OP_RETURN Metadata", International Conference on Financial Cryptography and Data Security, pp. 218-230, 2017. https://doi.org/10.1007/978-3-319-70278-0_14
DOI
|
11 |
https://bitinfocharts.com/comparison/bitcointransactionfees.html
|
12 |
S. Chang, L. Zhang, Y. Guan and T. E. Daniels, "A Framework for P2P Botnets", 2009 WRI International Conference on Communications and Mobile Computing, pp. 594-599, 2009. https://doi.org/10.1109/CMC.2009.268
DOI
|
13 |
Kwak, Minkyung, and Youngho Cho, "A novel video steganography-based botnet communication model in telegram sns messenger", Symmetry, 13(1), 84, 2021. https://doi.org/10.3390/sym13010084
DOI
|
14 |
G. Vormayr, T. Zseby and J. Fabini, "Botnet Communication Patterns", IEEE Communications Surveys & Tutorials, Vol. 19, No. 4, pp. 2768-2796, 2017. http://dx.doi.org/10.1109/COMST.2017.2749442
DOI
|
15 |
V. Vallois and F. A. Guenane, "Bitcoin transaction: From the creation to validation, a protocol overview, 2017 1st Cyber Security in Networking Conference (CSNet), pp. 378-403, 2017. https://doi.org/10.1109/CSNET.2017.8241988
DOI
|
16 |
Franzoni, F., Abellan, I., Daza, V, "Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems", International Conference on Financial Cryptography and Data Security, pp. 3-19, 2020. https://doi.org/10.1007/978-3-030-51280-4_1
DOI
|