@article{bib:persistentstruct, author = {James R Driscoll and Neil Sarnak and Daniel D. Sleator and Robert E. Tarjan}, title = {Making Data Structures Persistent}, journal = {Journal of Computer and System Sciences}, year = {1989}, month = {02}, volume = {Vol. 38, No. 1}, pages = {86-124} } @article{zhang_building_2014, title = {Building a Scalable System for Stealthy P2P-Botnet Detection}, volume = {9}, issn = {1556-6013, 1556-6021}, url = {http://ieeexplore.ieee.org/document/6661360/}, doi = {10.1109/TIFS.2013.2290197}, pages = {27--38}, number = {1}, journaltitle = {{IEEE} Transactions on Information Forensics and Security}, shortjournal = {{IEEE} Trans.Inform.Forensic Secur.}, author = {Zhang, Junjie and Perdisci, Roberto and Lee, Wenke and Luo, Xiapu and Sarfraz, Unum}, urldate = {2021-11-09}, date = {2014-01}, file = {Full Text:/home/me/Zotero/storage/PFXP8NLV/Zhang et al. - 2014 - Building a Scalable System for Stealthy P2P-Botnet.pdf:application/pdf} } @incollection{kim_survey_2012, location = {Dordrecht}, title = {A Survey on P2P Botnet Detection}, volume = {120}, isbn = {978-94-007-2910-0 978-94-007-2911-7}, url = {http://link.springer.com/10.1007/978-94-007-2911-7_56}, pages = {589--593}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security 2011}, publisher = {Springer Netherlands}, author = {Han, Kyoung-Soo and Im, Eul Gyu}, editor = {Kim, Kuinam J. and Ahn, Seong Jin}, urldate = {2021-11-11}, date = {2012}, doi = {10.1007/978-94-007-2911-7_56}, note = {Series Title: Lecture Notes in Electrical Engineering}, file = {Full Text:/home/me/Zotero/storage/CMFWF58V/Han and Im - 2012 - A Survey on P2P Botnet Detection.pdf:application/pdf} } @online{statista_iot_2020, title = {Number of Internet of Things (IoT) Connected Devices Worldwide from 2019 to 2030}, organization = {Statista Inc.}, publisher = {Transforma Insights}, date = {2020-12}, url = {https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/}, urldate = {2021-11-11}, archiveurl = {https://web.archive.org/web/20211025185804/https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/}, archivedate = {2021-10-25} } @online{statista_broadband_2021, title = {Availability of broadband internet to households in Germany from 2017 to 2020, by bandwidth class}, organization = {Statista Inc.}, publisher = {BMVI}, date = {2021-08-16}, url = {https://www.statista.com/statistics/460180/broadband-availability-by-bandwidth-class-germany/}, urldate = {2021-11-11}, archiveurl = {https://web.archive.org/web/20210309010747/https://www.statista.com/statistics/460180/broadband-availability-by-bandwidth-class-germany/}, archivedate = {2021-03-09} } @online{ars_ddos_2016, title = {Brace yourselves --- source code powering potent IoT DDoSes just went public}, date = {2016-10-02}, author = {Dan Goodin}, organization = {Ars Technica}, url = {https://arstechnica.com/information-technology/2016/10/brace-yourselves-source-code-powering-potent-iot-ddoses-just-went-public/}, urldate = {2021-11-11}, archiveurl = {https://web.archive.org/web/20211022032617/https://arstechnica.com/information-technology/2016/10/brace-yourselves-source-code-powering-potent-iot-ddoses-just-went-public/}, archivedate = {2021-10-22}, } @article{fan_p2p_2014, title = {A P2P Botnet Detection Method Used On-line Monitoring and Off-line Detection}, volume = {8}, issn = {17389976, 17389976}, url = {http://article.nadiapub.com/IJSIA/vol8_no3/10.pdf}, doi = {10.14257/ijsia.2014.8.3.10}, pages = {87--96}, number = {3}, journaltitle = {International Journal of Security and Its Applications}, shortjournal = {{IJSIA}}, author = {Fan, Yuhui and Xu, Ning}, urldate = {2021-11-11}, date = {2014-05-31}, file = {Full Text:/home/me/Zotero/storage/7UI2IFIL/Fan and Xu - 2014 - A P2P Botnet Detection Method Used On-line Monitor.pdf:application/pdf} } @inproceedings{bock_poster_2019, location = {London United Kingdom}, title = {Poster: Challenges of Accurately Measuring Churn in P2P Botnets}, isbn = {978-1-4503-6747-9}, url = {https://dl.acm.org/doi/10.1145/3319535.3363281}, doi = {10.1145/3319535.3363281}, shorttitle = {Poster}, eventtitle = {{CCS} '19: 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security}, pages = {2661--2663}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security}, publisher = {{ACM}}, author = {Böck, Leon and Karuppayah, Shankar and Fong, Kory and Mühlhäuser, Max and Vasilomanolakis, Emmanouil}, urldate = {2021-11-12}, date = {2019-11-06}, langid = {english}, file = {Böck et al. - 2019 - Poster Challenges of Accurately Measuring Churn i.pdf:/home/me/Zotero/storage/FGQXMN3H/Böck et al. - 2019 - Poster Challenges of Accurately Measuring Churn i.pdf:application/pdf} } @inproceedings{karuppayah_boobytrap_2016, location = {Kuala Lumpur, Malaysia}, title = {{BoobyTrap}: On autonomously detecting and characterizing crawlers in P2P botnets}, isbn = {978-1-4799-6664-6}, url = {http://ieeexplore.ieee.org/document/7510885/}, doi = {10.1109/ICC.2016.7510885}, shorttitle = {{BoobyTrap}}, eventtitle = {{ICC} 2016 - 2016 {IEEE} International Conference on Communications}, pages = {1--7}, booktitle = {2016 {IEEE} International Conference on Communications ({ICC})}, publisher = {{IEEE}}, author = {Karuppayah, Shankar and Vasilomanolakis, Emmanouil and Haas, Steffen and Muhlhauser, Max and Fischer, Mathias}, urldate = {2021-11-12}, date = {2016-05}, file = {Karuppayah et al. - 2016 - BoobyTrap On autonomously detecting and character.pdf:/home/me/Zotero/storage/UAUH5ZAN/Karuppayah et al. - 2016 - BoobyTrap On autonomously detecting and character.pdf:application/pdf} } @inproceedings{andriesse_reliable_2015, location = {Tokyo Japan}, title = {Reliable Recon in Adversarial Peer-to-Peer Botnets}, isbn = {978-1-4503-3848-6}, url = {https://dl.acm.org/doi/10.1145/2815675.2815682}, doi = {10.1145/2815675.2815682}, eventtitle = {{IMC} '15: Internet Measurement Conference}, pages = {129--140}, booktitle = {Proceedings of the 2015 Internet Measurement Conference}, publisher = {{ACM}}, author = {Andriesse, Dennis and Rossow, Christian and Bos, Herbert}, urldate = {2021-11-16}, date = {2015-10-28}, langid = {english}, file = {Andriesse et al. - 2015 - Reliable Recon in Adversarial Peer-to-Peer Botnets.pdf:/home/me/Zotero/storage/YJZMYTCB/Andriesse et al. - 2015 - Reliable Recon in Adversarial Peer-to-Peer Botnets.pdf:application/pdf} } /* vim: set filetype=bib ts=2 sw=2 tw=0 et :*/