1.章云濤、龔玲(2007),資料探勘原理與技術,台北,台灣:五南圖書出版股份有限公司,第63-74頁。
2.蘇園翔(2017),封包方向序列:抵擋規避殭屍網路偵測系統的新特徵,國立交通大學網路工程研究所碩士論文,第19頁。3.謝鈐楊(2009),運用資料探勘技術建置期殭屍電腦程式防護機制,育達商業科技大學資訊管理研究所碩士論文,第12-19頁。
4.陳天豪(2009),透過封包分析偵測並瓦解殭屍網路,國立中央大學資訊工程研究所碩士論文,第22-25頁。5.陳美君(2007),運用線上分析處理與資料探勘於網路流量分析,國立交通大學管理學院(資訊管理學程)碩士班碩士論文,第10-12、第15-20頁。6.蔡閎亘(2011),簡潔化惡意軟體行為分析,國立中山大學資訊研究所碩士論文,第17-21頁。7.TACERT(2015),個案分析 - 偽裝成挖礦工具的惡意程式分析報告,第5-7頁。
8. 袁梅宇(2016),王者歸來:WEKA機器學習與大數據聖經(第三版),台北,台灣: 佳魁資訊股份有限公司,第1-7頁、第1-15頁、第2-36頁、第B-58頁。
9.趙建智(2016),基於HTTP協定之可疑流量偵測研究,國立中央大學資訊管理學系碩士論文,第24-33頁。
10.McAfee Report(2018),McAfee Labs Threats Report,第7-18頁。
11.Sophos Threat Analysis, https://www.sophos.com/en-us/threat-center/threat-analyses.aspx
12.MeAfee Security Analysis, https://www.mcafee.com/enterprise/zh-tw/products/security-analytics-products.html
13.W. Liu, P. Ren, K. Liu, and H. X. Duan(2011), Behavior-based malware analysis and detection, in Proceedings of Complexity and Data Mining (IWCDM), pp. 39-42.
14.A. Moser, C. Kruegel, and E. Kirda(2007), Exploring multiple execution paths for malware analysis, in Proceedings of 2007 IEEE Symposium on Security p
15. I. Firdausi, C. Lim, A. Erwin, and A. S. Nugroho(2010), Analysis of machine learning techniques used in behavior-based malware detection, in Proceedings of the Second International Conference on Advances in Computing, Control and Telecommunication Technologies, pp. 201-203.
16.C. Wang, J. Pang, R. Zhao, W. Fu, and X. Liu(2009), Malware detection based on suspicious behavior identification, in Proceedings of Education Technology and Computer Science, Vol. 2, pp. 198-202.
17.Ma, Justin, Saul Lawrence, Savage, Stefan and Voelker, Geoffrey M(2009), Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. pp. 1245-1255.
18.Ian H. Witten, Eibe Frank(2005), Data Mining Practical Machine Learning Tools and Techniques, University of Waikato Department of Computer Science, Elsevier Inc,pp. 9,366
19.Yanfang Ye, Tao Li, Shenghuo Zhu, Weiwei Zhuang, Egemen Tas, Umesh, Melih Abdulhayoglu(2011), Combining File Content and File Relations for Cloud Based Malware Detection, Knowledge discovery and data mining(KDD’11), pp. 220-230.
20.Cory Q. Nguyen, James E. Goldman(2010), Malware Analysis Reverse Engineering (MARE) Methodology & Malware Defense (M.D.) Timeline, Information Security Curriculum Development Conference, pp. 8-14.
21.Remco R. Bouckaert, Eibe Frank, Mark Hall, Richard Kirkby, Peter Reutemann, Alex Seewald, David Scuse(2013), WEKA Manual,The Unibersity Of Waikato, University of Waikato, Hamilton, New Zealand,pp. 31-38.