-
1
-
-
34047180005
-
Studying bluetooth malware propagation: The blue-bag project
-
L. Carettoni, C. Merloni, and S. Zanero, "Studying Bluetooth Malware Propagation: The Blue-bag Project," IEEE Security & Pri-vacy, vol.5, no.2, 2007, pp. 17-25.
-
(2007)
IEEE Security & Pri-vacy
, vol.5
, Issue.2
, pp. 17-25
-
-
Carettoni, L.1
Merloni, C.2
Zanero, S.3
-
2
-
-
46049100524
-
Warkitting: The drive-by subversion of wireless home routers
-
A. Tsow et al., "Warkitting: The Drive-by Subversion of Wireless Home Routers," J. Digital Foren-sic Practice, vol.1, no.3, 2006, pp. 179-192.
-
(2006)
J. Digital Foren-sic Practice
, vol.1
, Issue.3
, pp. 179-192
-
-
Tsow, A.1
-
3
-
-
50249088136
-
Proxim-ity breeds danger: Emerging threats in metro-area wireless networks
-
Usenix Assoc
-
P. Akritidis et al., "Proxim-ity Breeds Danger: Emerging Threats in Metro-Area Wireless Networks," Proc. 16th Usenix Se-curity Symposium, Usenix Assoc., 2007, pp. 1-16.
-
(2007)
Proc. 16th Usenix Se-curity Symposium
, pp. 1-16
-
-
Akritidis, P.1
-
4
-
-
60849108674
-
WiFi networks and malware epidemiology
-
H. Hu et al., "WiFi Networks and Malware Epidemiology," Proc. National Academy of Sciences, vol.106, no.5, 2009, pp. 1318-1323.
-
(2009)
Proc. National Academy of Sciences
, vol.106
, Issue.5
, pp. 1318-1323
-
-
Hu, H.1
-
5
-
-
38149086751
-
Drive-by pharming
-
Information and Communication Security, Springer- Verlag
-
S. Stamm, Z. Ramzan, and M. Jakobsson, "Drive-By Pharming," Information and Communication Security, LNCS 4861, Springer- Verlag, 2008, pp. 495-506.
-
(2008)
LNCS 4861
, pp. 495-506
-
-
Stamm, S.1
Ramzan, Z.2
Jakobsson, M.3
-
6
-
-
38549101578
-
Breaking 104-bit WEP in Less than 60 seconds
-
Information Security Applications, Springer-Verlag
-
E. Tews, R.P. Weinmann, and A. Pyshkin, "Breaking 104-bit WEP in Less than 60 Seconds," Information Security Applications, LNCS 4867, Springer-Verlag, 2008, pp. 188-202.
-
(2008)
LNCS 4867
, pp. 188-202
-
-
Tews, E.1
Weinmann, R.P.2
Pyshkin, A.3
-
7
-
-
34547218865
-
A preliminary In-vestigation of worm infections in a bluetooth environment
-
ACM Press
-
J. Su et al., "A Preliminary In-vestigation of Worm Infections in a Bluetooth Environment," Proc. 4th ACM Workshop on Recur-ring Malcode (WORM 06), ACM Press, 2006, pp. 9-16.
-
(2006)
Proc. 4th ACM Workshop on Recur-ring Malcode (WORM 06)
, pp. 9-16
-
-
Su, J.1
-
9
-
-
58849141571
-
Mod-eling propagation dynamics of bluetooth worms
-
G. Yan and S. Eidenbenz, "Mod-eling Propagation Dynamics of Bluetooth Worms," IEEE Trans. Mobile Computing, vol.8, no.3, 2009, pp. 353-368.
-
(2009)
IEEE Trans. Mobile Computing
, vol.8
, Issue.3
, pp. 353-368
-
-
Yan, G.1
Eidenbenz, S.2
-
10
-
-
44649187943
-
Is It Finally Time to Worry about Mobile Malware?
-
G. Lawton, "Is It Finally Time to Worry about Mobile Malware?" Computer, vol.41, no.5, 2008, pp. 12-14.
-
(2008)
Computer
, vol.41
, Issue.5
, pp. 12-14
-
-
Lawton, G.1
-
11
-
-
70449471304
-
Bluebat: Towards prac-tical bluetooth honeypots
-
IEEE Press
-
A. Galante, A. Kokos, and S. Zanero, "Bluebat: Towards Prac-tical Bluetooth Honeypots," Proc. 2009 IEEE Int'l Conf. Communica-tions, IEEE Press, 2009, pp. 1-6.
-
(2009)
Proc. 2009 IEEE Int'l Conf. Communica-tions
, pp. 1-6
-
-
Galante, A.1
Kokos, A.2
Zanero, S.3
-
12
-
-
39049104692
-
Blue-tooth Worms: Models, dynamics, and defense implications
-
IEEE CS Press
-
G. Yan and S. Eidenbenz, "Blue-tooth Worms: Models, Dynamics, and Defense Implications," Proc. 22nd Ann. Computer Security Ap-plications Conf. (ACSAC 06), IEEE CS Press, 2006, pp. 245-256.
-
(2006)
Proc. 22nd Ann. Computer Security Ap-plications Conf. (ACSAC 06)
, pp. 245-256
-
-
Yan, G.1
Eidenbenz, S.2
|