@article{bib:persistentstruct, author = {James R Driscoll and Neil Sarnak and Daniel D. Sleator and Robert E. Tarjan}, title = {Making Data Structures Persistent}, journal = {Journal of Computer and System Sciences}, year = {1989}, month = {02}, volume = {Vol. 38, No. 1}, pages = {86-124} } @article{zhang_building_2014, title = {Building a Scalable System for Stealthy P2P-Botnet Detection}, volume = {9}, issn = {1556-6013, 1556-6021}, url = {http://ieeexplore.ieee.org/document/6661360/}, doi = {10.1109/TIFS.2013.2290197}, pages = {27--38}, number = {1}, journaltitle = {{IEEE} Transactions on Information Forensics and Security}, shortjournal = {{IEEE} Trans.Inform.Forensic Secur.}, author = {Zhang, Junjie and Perdisci, Roberto and Lee, Wenke and Luo, Xiapu and Sarfraz, Unum}, urldate = {2021-11-09}, date = {2014-01}, file = {Full Text:/home/me/Zotero/storage/PFXP8NLV/Zhang et al. - 2014 - Building a Scalable System for Stealthy P2P-Botnet.pdf:application/pdf} } @incollection{kim_survey_2012, location = {Dordrecht}, title = {A Survey on P2P Botnet Detection}, volume = {120}, isbn = {978-94-007-2910-0 978-94-007-2911-7}, url = {http://link.springer.com/10.1007/978-94-007-2911-7_56}, pages = {589--593}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security 2011}, publisher = {Springer Netherlands}, author = {Han, Kyoung-Soo and Im, Eul Gyu}, editor = {Kim, Kuinam J. and Ahn, Seong Jin}, urldate = {2021-11-11}, date = {2012}, doi = {10.1007/978-94-007-2911-7_56}, note = {Series Title: Lecture Notes in Electrical Engineering}, file = {Full Text:/home/me/Zotero/storage/CMFWF58V/Han and Im - 2012 - A Survey on P2P Botnet Detection.pdf:application/pdf} } @online{statista_iot_2020, title = {Number of Internet of Things (IoT) Connected Devices Worldwide from 2019 to 2030}, organization = {Statista Inc.}, publisher = {Transforma Insights}, date = {2020-12}, url = {https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/}, urldate = {2021-11-11} } @online{statista_broadband_2021, title = {Availability of broadband internet to households in Germany from 2017 to 2020, by bandwidth class}, organization = {Statista Inc.}, publisher = {BMVI}, date = {2021-08-16}, url = {https://www.statista.com/statistics/460180/broadband-availability-by-bandwidth-class-germany/}, urldate = {2021-11-11} } @online{ars_ddos_2016, title = {Brace yourselves --- source code powering potent IoT DDoSes just went public}, date = {2016-10-02}, author = {Dan Goodin}, organization = {Ars Technica}, url = {https://arstechnica.com/information-technology/2016/10/brace-yourselves-source-code-powering-potent-iot-ddoses-just-went-public/}, urldate = {2021-11-11}, archiveurl = {http://example.com}, archivedate = {2021-11-11}, } @article{fan_p2p_2014, title = {A P2P Botnet Detection Method Used On-line Monitoring and Off-line Detection}, volume = {8}, issn = {17389976, 17389976}, url = {http://article.nadiapub.com/IJSIA/vol8_no3/10.pdf}, doi = {10.14257/ijsia.2014.8.3.10}, pages = {87--96}, number = {3}, journaltitle = {International Journal of Security and Its Applications}, shortjournal = {{IJSIA}}, author = {Fan, Yuhui and Xu, Ning}, urldate = {2021-11-11}, date = {2014-05-31}, file = {Full Text:/home/me/Zotero/storage/7UI2IFIL/Fan and Xu - 2014 - A P2P Botnet Detection Method Used On-line Monitor.pdf:application/pdf} } /* vim: set filetype=bib ts=2 sw=2 tw=0 et :*/