MobiPot: Understanding Mobile Telephony Threats with Honeycards
暂无分享,去创建一个
[1] M. Newman,et al. Finding community structure in networks using the eigenvectors of matrices. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.
[2] Ge Zhang,et al. Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes , 2011, ISC.
[3] Nan Jiang,et al. Greystar : Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks using Grey Phone Space , 2013 .
[4] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[5] Nan Jiang,et al. Isolating and analyzing fraud activities in a large cellular network via voice call graph analysis , 2012, MobiSys '12.
[6] References , 1971 .
[7] Nick Feamster,et al. Understanding the network-level behavior of spammers , 2006, SIGCOMM.
[8] M. Ivimey. Annual report , 1958, IRE Transactions on Engineering Writing and Speech.
[9] Markus Jakobsson,et al. Scambaiter: Understanding Targeted Nigerian Scams on Craigslist , 2014, NDSS.
[10] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[11] Mustaque Ahamad,et al. Phoneypot: Data-driven Understanding of Telephony Threats , 2015, NDSS.
[12] Federico Maggi. Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[13] Guofei Gu,et al. HoneyStat: Local Worm Detection Using Honeypots , 2004, RAID.
[14] Aurélien Francillon,et al. The role of phone numbers in understanding cyber-crime schemes , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.