@article{bib:persistentstruct, author = {James R Driscoll and Neil Sarnak and Daniel D. Sleator and Robert E. Tarjan}, title = {Making Data Structures Persistent}, journal = {Journal of Computer and System Sciences}, year = {1989}, month = {02}, volume = {Vol. 38, No. 1}, pages = {86-124} } @article{zhang_building_2014, title = {Building a Scalable System for Stealthy P2P-Botnet Detection}, volume = {9}, issn = {1556-6013, 1556-6021}, url = {http://ieeexplore.ieee.org/document/6661360/}, doi = {10.1109/TIFS.2013.2290197}, pages = {27--38}, number = {1}, journaltitle = {{IEEE} Transactions on Information Forensics and Security}, shortjournal = {{IEEE} Trans.Inform.Forensic Secur.}, author = {Zhang, Junjie and Perdisci, Roberto and Lee, Wenke and Luo, Xiapu and Sarfraz, Unum}, urldate = {2021-11-09}, date = {2014-01}, file = {Full Text:/home/me/Zotero/storage/PFXP8NLV/Zhang et al. - 2014 - Building a Scalable System for Stealthy P2P-Botnet.pdf:application/pdf} }