A Mobile Botnet Model Based on Android System
暂无分享,去创建一个
Can Zhang | Peng Wang | Chengwei Zhang | Xuanya Li | Xuan Li | C. Zhang | Chengwei Zhang | Peng Wang
[1] Pavel Laskov,et al. Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings , 2022, International Conference on Detection of intrusions and malware, and vulnerability assessment.
[2] Li Dong. Overview of Botnet , 2006 .
[3] Kang G. Shin,et al. Design of SMS commanded-and-controlled and P2P-structured mobile botnets , 2012, WISEC '12.
[4] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[5] Jean-Pierre Seifert,et al. Rise of the iBots: Owning a telco network , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[6] Fang Binxing,et al. Andbot: towards advanced mobile botnets , 2011 .
[7] Wenke Lee,et al. Evaluating Bluetooth as a Medium for Botnet Command and Control , 2010, DIMVA.
[8] Sahin Albayrak,et al. Smartphone malware evolution revisited: Android next target? , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[9] Vinod Yegneswaran,et al. An Analysis of the iKee.B iPhone Botnet , 2010, MobiSec.
[10] Axelle Apvrille. Symbian worm Yxes: towards mobile botnets? , 2012, Journal in Computer Virology.