[1] 孫郁興,”電腦病毒科技發展史之研究”,中華科技史學會會刊,第十期,2006。[2] http://www.cib.gov.tw/news/news02_2.aspx?no=261。
[3] http://www.itis.tw/node/1273。
[4] http://www.runpc.com.tw/content/main_content.aspx?mgo=185&fid=G03。
[5] http://www.libertytimes.com.tw/2010/new/jun/1/today-life8.htm。
[6] http://domynews.blog.ithome.com.tw/trackbacks/1252/36516。
[7] http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project。
[8] http://www.networkworld.com/news/2009/072209-botnets.html。
[9] http://www.tuaw.com/2010/03/20/20-zero-day-security-holes-in-mac-os-x-to-
be-revealed/。
[10] http://www.xssed.org/archive/special=1/page=1/。
[11] http://www.1c3man.com/1c3man/cal9000/cal9000.html#top。
[12] 田筱榮,劉邦威,”P2P殭屍網路之適應防禦機制”,中原大學,桃園。
[13] http://www.symantec.com/norton/theme.jsp?themeid=ibotnet。
[14] http://clubhouse.microsoft.com/Public/Post/d4666a88-8d90-4d6c-9311-07e945
2eebdb。
[15] Dae-il Jang, Minsoo Kim, Hyun-chul Jung, Bong-Nam Noh,” Analysis of HTTP2P Botnet :Case Study Waledac”, Proceedings of the 2009 IEEE 9th Malaysia International Conference on Communications15 -17 December 2009 Kuala Lumpur Malaysia.
[16] http://en.wikipedia.org/wiki/Zeus_%28trojan_horse%29。
[17] Ben Stock, Jan Gobel, Markus Engelberth, Felix C. Freiling, and Thorsten Holz,” Walowdac- Analysis of a Peer-to-Peer Botnet”, European Conference on Computer Network Defense,2009.
[18] L ivadas, C., Walsh, R., Lapsley, D., and Strayer, W. T., “Using Machine Learning Techniques to Identify Botnet Traffic,” Proceedings 2006 31st IEEE Conference on Local Computer Networks, pp. 967-974, 14-16 Nov., 2006.
[19] Daswani, N., Stoppelman, M., and the Google Click Quality and Security Teams, “The Anatomy of Clickbot.A,” http://www.usenix.org/events/hotbots07
/tech/full_papers/daswani/daswani.pdf.
[20] Wang, W., Fang, B. X., Zhang, Z. X., and Li, C., “A Novel Approach to Detect IRC-Based Botnets,” International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, Hubei, pp. 408-411, 25-26 April, 2009.