Visualizing and Modeling the Scanning Behavior of the Conficker Botnet in the Presence of User and Network Activity | IEEE Journals & Magazine | IEEE Xplore