[1] Du Yue-Jin, Cui Xiang, “Malicious botnet and its illumination on computer security”, China Data Communication, vol. 7, no. 5, pp.9-12, 2005.[2] Genevieve Bartlett, John Heidemann, Christos Papadopoulos, “Low-rate, flow-level periodicity detection”, 2011 IEEE Conference on Computer Communications Workshops, pp.804-809, 2011.[3] Cheng Binlin, Fu Jianming, Yin Zhiyi, “Heap Spraying Attack Detection Based on Sled Distance”, JDCTA, Vol. 6, No. 14, pp.379-386, 2012.[4] Bo Liu, Xiaolong Ma, Tianzuo Wang, Jing Zhang, Fang Yang, “Development of Research on Botnet Defenses, From the Viewpoint of Botnet Lifecycle”, JCIT, Vol. 7, No. 18, pp.66-75, 2012.[5] AsSadhan B, Moura J M F, Lapsley D, et al, “Detecting botnets using command and control traffic”, 2009 Eighth IEEE International Symposium on Network Computing and Applications, pp. 156-162, 2009.[6] Chen Lu-Ying, Wang Xin-Liang, Zhao Xin, et al, “Research of botnet anomaly detection algorithm based on private protocol”, Proceedings of 2010 3rd IEEE International Conference on Broadband Network & Multimedia Technology, pp.55-59, 2010.[7] Wang Xin-Liang, Lu Nan, Wang Cui-Cui, “Research of botnet detection based on multi-stage classifier”, Proceedings of the 2011 International Conference on Electrical, Information Engineering and Mechatronics, pp.1463-1472, 2011.[8] Wald A. Sequential Analysis. New York: John Wiley and Sons, 1947.[9] M A Nielsen and I L Chuang. Quantum Computation and Quantum Information, Cambridge Unversity Press, 2000.[10] L Grover. A Fast Quantum Mechanical Algorithm for Database Search, Proceedings of 28th Annual ACM Symposium on the Theory of Computing, pp.212-2l9, 1996. |