메뉴 건너뛰기




Volumn 29, Issue 5, 2010, Pages 592-602

Roving bugnet: Distributed surveillance threat and mitigation

Author keywords

Anti spyware; Bot; Botnet; Mac OS X; Microphone hijack; Mobile devices; Roving bug; Spyware; Surveillance; Win XP

Indexed keywords

ANTI-SPYWARES; BOT; BOTNET; MAC OS X; ROVING BUG; SPY-WARE; SURVEILLANCE; WIN XP;

EID: 77955716041     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2009.12.002     Document Type: Article
Times cited : (8)

References (34)
  • 3
    • 84858547747 scopus 로고    scopus 로고
    • Apple
    • Apple, QuickTime Broadcaster http://apple.com/quicktime/broadcaster
    • QuickTime Broadcaster
  • 9
    • 23344439017 scopus 로고    scopus 로고
    • Spyware was inevitable
    • S. Gibson Spyware was inevitable Communications of the ACM 48 8 2005 37 39
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 37-39
    • Gibson, S.1
  • 12
    • 85075837457 scopus 로고    scopus 로고
    • BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
    • USENIX
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection Proceedings of the 17th USENIX security symposium 2008 USENIX
    • (2008) Proceedings of the 17th USENIX Security Symposium
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 18
    • 77955716478 scopus 로고    scopus 로고
    • Botnets: Overview and case study
    • Mercy College
    • Kiran-Kola M. Botnets: overview and case study. Tech. rep., Mercy College; 2008.
    • (2008) Tech. Rep.
    • Kiran-Kola, M.1
  • 19
    • 18144370814 scopus 로고    scopus 로고
    • Mobile phones: The next frontier for hackers?
    • 101109/M2005134
    • N. Leavitt Mobile phones: the next frontier for hackers? IEEE Computer 38 4 2005 20 23 10.1109/MC.2005.134
    • (2005) IEEE Computer , vol.38 , Issue.4 , pp. 20-23
    • Leavitt, N.1
  • 20
    • 84906038213 scopus 로고    scopus 로고
    • FBI taps cell phone mic as eavesdropping tool
    • D. McCullagh FBI taps cell phone mic as eavesdropping tool ZDNet News Dec. 2006
    • (2006) ZDNet News
    • McCullagh, D.1
  • 21
    • 77950813354 scopus 로고    scopus 로고
    • The snooping dragon: Social-malware surveillance of the tibetan movement
    • Computer Laboratory; March
    • Nagaraja S, Anderson R. The snooping dragon: social-malware surveillance of the tibetan movement. Tech. Rep. UCAM-CL-TR-746: University of Cambridge, Computer Laboratory; March 2009.
    • (2009) Tech. Rep. UCAM-CL-TR-746: University of Cambridge
    • Nagaraja, S.1    Anderson, R.2
  • 27
    • 77955711653 scopus 로고    scopus 로고
    • Comparison of voice over IP with circuit switching techniques
    • Department of Electronics and Computer Science; Jan
    • Sinden R. Comparison of voice over IP with circuit switching techniques. Tech. rep.: Southampton University, Department of Electronics and Computer Science; Jan. 2002.
    • (2002) Tech. Rep.: Southampton University
    • Sinden, R.1
  • 32
    • 85029716586 scopus 로고    scopus 로고
    • Editorial: People watching people
    • D. Wood Editorial: people watching people Surveillance and Society 2 4 2005 474 478
    • (2005) Surveillance and Society , vol.2 , Issue.4 , pp. 474-478
    • Wood, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.