• Pan P, Ma X, Fu Y, Chen F and Meng W. (2022). Automating Group Management of Large-Scale IoT Botnets for Antitracking. Security and Communication Networks. 2022. Online publication date: 1-Jan-2022.

    https://doi.org/10.1155/2022/4196945

  • Nabeel M, Khalil I, Guan B and Yu T. (2020). Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference. ACM Transactions on Privacy and Security. 23:4. (1-36). Online publication date: 30-Nov-2020.

    https://doi.org/10.1145/3401897

  • Yang D, Li Z and Tyson G. A deep dive into DNS query failures. Proceedings of the 2020 USENIX Conference on Usenix Annual Technical Conference. (507-514).

    /doi/10.5555/3489146.3489180

  • Al-Nawasrah A, Almomani A, Atawneh S and Alauthman M. (2020). A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing. International Journal of Cloud Applications and Computing. 10:3. (17-53). Online publication date: 1-Jul-2020.

    https://doi.org/10.4018/IJCAC.2020070102

  • Xie X, Niu W, Zhang X, Ren Z, Luo Y and Li J. Co-Clustering Host-Domain Graphs to Discover Malware Infection. Proceedings of the 2019 International Conference on Artificial Intelligence and Advanced Manufacturing. (1-6).

    https://doi.org/10.1145/3358331.3358380

  • Curtin R, Gardner A, Grzonkowski S, Kleymenov A and Mosquera A. Detecting DGA domains with recurrent neural networks and side information. Proceedings of the 14th International Conference on Availability, Reliability and Security. (1-10).

    https://doi.org/10.1145/3339252.3339258

  • Zhauniarovich Y, Khalil I, Yu T and Dacier M. (2018). A Survey on Malicious Domains Detection through DNS Data Analysis. ACM Computing Surveys. 51:4. (1-36). Online publication date: 31-Jul-2019.

    https://doi.org/10.1145/3191329

  • Khalil I, Guan B, Nabeel M and Yu T. A Domain is only as Good as its Buddies. Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy. (330-341).

    https://doi.org/10.1145/3176258.3176329

  • Fang C, Liu J and Ansari N. (2018). Revealing connectivity structural patterns among web objects based on co-clustering of bipartite request dependency graph. Wireless Networks. 24:2. (439-451). Online publication date: 1-Feb-2018.

    https://doi.org/10.1007/s11276-016-1345-5

  • Mohaisen A, Ren K, Mohaisen A and Kui Ren . (2017). Leakage of .onion at the DNS Root. IEEE/ACM Transactions on Networking. 25:5. (3059-3072). Online publication date: 1-Oct-2017.

    https://doi.org/10.1109/TNET.2017.2717965

  • Gardiner J and Nagaraja S. (2016). On the Security of Machine Learning in Malware C&C Detection. ACM Computing Surveys. 49:3. (1-39). Online publication date: 30-Sep-2017.

    https://doi.org/10.1145/3003816

  • Alieyan K, Almomani A, Manasrah A and Kadhum M. (2017). A survey of botnet detection based on DNS. Neural Computing and Applications. 28:7. (1541-1558). Online publication date: 1-Jul-2017.

    https://doi.org/10.1007/s00521-015-2128-0

  • Fang C and Liu B. (2016). Exploration of Web Page Structural Patterns Based on Request Dependency Graph Decomposition. International Journal of Digital Crime and Forensics. 8:4. (1-13). Online publication date: 1-Oct-2016.

    https://doi.org/10.4018/IJDCF.2016100101

  • Fontugne R, Mazel J and Fukuda K. Characterizing Roles and Spatio-Temporal Relations of C&C Servers in Large-Scale Networks. Proceedings of the 2016 ACM International on Workshop on Traffic Measurements for Cybersecurity. (12-23).

    https://doi.org/10.1145/2903185.2903192

  • Ma X, Zhang J, Li Z, Li J, Tao J, Guan X, Lui J and Towsley D. (2015). Accurate DNS query characteristics estimation via active probing. Journal of Network and Computer Applications. 47:C. (72-84). Online publication date: 1-Jan-2015.

    https://doi.org/10.1016/j.jnca.2014.09.016

  • Chen J, Fontugne R, Kato A and Fukuda K. Clustering Spam Campaigns with Fuzzy Hashing. Proceedings of the 10th Asian Internet Engineering Conference. (66-73).

    https://doi.org/10.1145/2684793.2684803

  • Lee J and Lee H. (2014). GMAD. Computer Communications. 49. (33-47). Online publication date: 1-Aug-2014.

    https://doi.org/10.1016/j.comcom.2014.04.013

  • Thomas M and Mohaisen A. Kindred domains. Proceedings of the 23rd International Conference on World Wide Web. (707-712).

    https://doi.org/10.1145/2567948.2579359

  • Kazato Y, Fukuda K and Sugawara T. Towards classification of DNS erroneous queries. Proceedings of the 9th Asian Internet Engineering Conference. (25-32).

    https://doi.org/10.1145/2534142.2534146

  • Jiang N, Jin Y, Skudlark A, Hsu W, Jacobson G, Prakasam S and Zhang Z. Isolating and analyzing fraud activities in a large cellular network via voice call graph analysis. Proceedings of the 10th international conference on Mobile systems, applications, and services. (253-266).

    https://doi.org/10.1145/2307636.2307660