http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-detecting-apt-activity-with-network-traffic-analysis.pdf
http://www.sans.edu/student-files/projects/JWP-Binde-McRee-OConnor.pdf
http://www.wseas.us/e-library/conferences/2013/Valencia/ACIC/ACIC-02.pdf
http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf
http://web2.research.att.com/techdocs/TD_101075.pdf
http://www.cpni.gov.uk/Documents/Publications/2014/2014-04-11-cc_qinetiq_report.pdf
http://csrc.nist.gov/organizations/fissea/2014-conference/presentations/fissea_2014_lewis.pdf
http://www.infoblox.com/sites/infobloxcom/files/resources/infoblox-note-dns-firewall-virtual-evaluation.pdf
http://nigesecurityguy.wordpress.com/2013/11/12/apt-detection-framework/