[1] M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, “A multifaceted approach to understanding the botnet phenomenon,” in Internet Measurement Conference, pp. 41-52, 2006.
[2] M. Feily, A. Shahrestani, and S. Ramadass, “A survey of botnet and botnet detection,” in Emerging Security Information, Systems, and Technologies Conference, pp. 268-273, Greece, 2009.
[3] J. Leonard, S. Xu, and R. Sandhu, “A framework for understanding botnets,” in Availability, Reliability, and Security Conference, pp. 917-922, 2009.
[4] M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and M. Karir, “A survey of botnet technology and defenses,” in Cybersecurity Applications and Technology Conference, pp. 299-304, USA, 2009.
[5] Lawrence Berkeley National Laboratory and ICSI, LBNL/ICSI enterprise tracing project, LBNL enterprise trace repository, http://www.icir.org/enterprise-tracing/2016-11-08.
[6] D. Zhao, I. Traore, B. Sayed, W. Lu, Sh. Saad, A. Ghorbani, and D. Garant, “Botnet detection based on traffic behavior analysis and flow intervals,” Computers & Security, vol. 39, Part A, pp. 2-16, 2013.
[7] J. Nazario, “BlackEnergy DDoS bot analysis,” Technical report, Arbor networks, 2007.
[8] F-secure labs security response, BLACKENERGY amd QUEDAGH, the convergence of crimeware and APT attacks, Malware analysis white paper, 2014.
[9] W. Chang, A. Mohaisen, A. Wang, and S. Chen, “Measuring botnets in the wild: some new trends,” in Information, Computer and Communications Security Conference, pp. 645-650, 2015.
[10] C. Livadas, R. Walsh, D. Lapsley, and W. T. Strayer, “Using machine learning technliques to identify botnet traffic”, in Local Computer Networks Conference, pp. 967-974, 2006.
[11] G. Gu, R. Perdisci, J. Zhang, and W. Lee, “BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection,” in Security Symposium, pp. 139-154, 2008.
[12] S. Saad, I. Traore, A. Ghorbani, B. Sayed, D. Zhao, and W. Lu, “Detecting P2P botnets through network behavior analysis and machine learning,” in Privacy, Security and Trust Conference, pp. 174-180, 2011.
[13] B. Wang, Z. Li, H. Tu, and J. MaWang, “Measuring peer-to-peer botnets using control flow stability,” in Availability, Reliability and Security Conference, pp. 663-669, 2009.
[14] H. R. Zeidanloo and S. Rouhani, Botnet detection by monitoring common network behaviors, Lambert Academic Publishing, 2012.
[15] G. Kirubavathi and R. Anitha, “Botnet detection via mining of traffic flow characteristics,” Computers and Electrical Engineering, vol. 50, pp. 91-101, 2016.
[16] B. K. Sin, J. Y. Ha, S. C. Oh, and J. H. Kim, “Network-based approach to online cursive script recognition,” IEEE Transactions on Systems, Man, and Cybernetics, Part B, vol. 29, no. 2, pp. 321-328, 1999.
[17] مسعود فرکی و مازیار پالهنگ، «بازشناسی برخط حروف فارسی بر پایه مدل مخفی مارکوف»، مجله مهندسی برق دانشگاه تبریز، دوره 40، شماره 1، صفحه 23- 34، 1389.
[18] K. Pulasinghe, K. Watanabe, K. Izumi, and K. Kiguchi, “Modular fuzzy-neuro controller driven by spoken language commands,” IEEE Transactions on Systems, Man, and Cybernetics, Part B, vol. 34, no. 1, pp.293-302, 2004.
[19] T. Starner and A. Pentland. “Visual recognition of american sign language using hidden markov models,” Perceptual Computing Section, the Media Laboratory, Massachusetts Institute of Technology, Technical Report, 1995.
[20] سیامک عبدالهزاده، محمدعلی بالافر و لیلی محمدخانلی، «استفاده از خوشهبندی و مدل مارکوف جهت پیشبینی درخواست آتی کاربر در وب»، مجله مهندسی برق دانشگاه تبریز، دوره 45، شماره 3، صفحه 89- 96، 1394.
[21] C. Lu and R. Brooks, “Botnet traffic detection using hidden markov models,” in Cyber Security and Information Intelligence Research Conference, pp. 31-34, 201.
[22] D. H. Kim, T. Lee, J. Kang, H. Jeong, and H. Peter, “Adaptive pattern mining model for early detection of botnet-propagation scale,” Security and Communicaion Networks, vol. 5, no. 8, pp. 917-927, 2012.
[23] Z. Abaid, D. Sarkar, M. A. Kaafar, and S. Jha, “The early bird gets the Botnet: A Markov chain based early warning system for botnet attacks,” in Local Computer Networks Conference, pp. 61-68, 2016.
[24] A. Garivier, “The Baum-Welch algorithm for hidden Markov models: speed comparison between octave/python/R /scilab/matlab/C/C++,” http://www.math.univ-toulouse.fr/~agariv ie/Telecom/code/index.php/2017-09-15.
[25] W. Gobel, “Detecting botnets using hidden Markov models on network traces,” White paper, 2008.
[26] C. Lu and R. R. Brooks, “P2P hierarchical botnet traffic detection using hidden Markov models,” in Learning from Authoritative Security Experiment Results Conference, pp. 41-46, 2012.