-
1
-
-
85084094893
-
Andbot: Towards Advanced Mobile Botnets
-
Cui, X., Fang, B., Yin, L., Liu, X.: Andbot: Towards Advanced Mobile Botnets. In: Proc. of the 4th USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET 2011) (2011)
-
(2011)
Proc. of the 4th USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET 2011)
-
-
Cui, X.1
Fang, B.2
Yin, L.3
Liu, X.4
-
4
-
-
80051516228
-
Fuzzing the Phone in your Phone
-
Mulliner, C.: Fuzzing the Phone in your Phone, http://www.mulliner.org/security/sms/feed/smsfuzz_26c3.pdf
-
-
-
Mulliner, C.1
-
6
-
-
41949089847
-
An advanced hybrid peer to peer botnet
-
In: Cambridge, MA
-
Wang, P., Sparks, S., et al.: An advanced hybrid peer to peer botnet. In: Proc. of the Hot-Bots 2007, First Workshop on Hot Topics in Understanding Botnets, Cambridge, MA (2007)
-
(2007)
Proc. of the Hot-Bots 2007 First Workshop on Hot Topics in Understanding Botnets
-
-
Wang, P.1
Sparks, S.2
-
7
-
-
77955030814
-
Evaluating Bluetooth as a Medium for Botnet Command and Control
-
Springer, Heidelberg, In: Kreibich, C., Jahnke, M. (eds.)
-
Singh, K., Sangal, S., Jain, N., Traynor, P., Lee, W.: Evaluating Bluetooth as a Medium for Botnet Command and Control. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol. 6201, pp. 61-80. Springer, Heidelberg (2010)
-
(2010)
DIMVA 2010. LNCS
, vol.6201
, pp. 61-80
-
-
Singh, K.1
Sangal, S.2
Jain, N.3
Traynor, P.4
Lee, W.5
-
9
-
-
74049108559
-
On Cellular Botnets:Measuring the Impact of Malicious Devices on a Cellular Network Core
-
In: November
-
Traynor, P., Lin, M., Ongtang, M., Rao, V., Jaeger, T., La Porta, T., McDaniel, P.: On Cellular Botnets:Measuring the Impact of Malicious Devices on a Cellular Network Core. In: ACM Conference on Computer and Communications Security (CCS) (November 2009)
-
(2009)
ACM Conference on Computer and Communications Security (CCS)
-
-
Traynor, P.1
Lin, M.2
Ongtang, M.3
Rao, V.4
Jaeger, T.5
la Porta, T.6
McDaniel, P.7
-
10
-
-
33644854066
-
Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices
-
IEEE Computer Society, Washington, DC, In: PERCOMW 2005
-
Nash, D.C., Martin, T.L., Ha, D.S., Hsiao, M.S.: Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices. In: Proceedings of the Third IEEEInternational Conference on Pervasive Computing and Communications Workshops, PERCOMW 2005, pp. 141-145. IEEE Computer Society, Washington, DC (2005)
-
(2005)
Proceedings of the Third IEEEInternational Conference on Pervasive Computing and Communications Workshops
, pp. 141-145
-
-
Nash, D.C.1
Martin, T.L.2
Ha, D.S.3
Hsiao, M.S.4
-
11
-
-
57349195106
-
Detecting energygreedy anomalies and mobile malware variants
-
Kim, H., Smith, J., Shin, K.G.: Detecting energygreedy anomalies and mobile malware variants. In: MobiSys (2008)
-
(2008)
MobiSys
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
|