1Porras, P,Saidi,H,Yegneswaran, V. An analysis of the Ikee.B (Duh) iPhone botnet[Z].2009.
同被引文献4
1Zeng Yuan-yuan, Hu Xin, Shin K G. Design of SMS CommandedandControlled and P2P-Structured Mobile Botnets [EB/OL]. https:// www.eecs.umich.edu/techreports/cse/2010/CSE-TR-562-10.pdf.
2Singh K, Sangal S, Jain N, et al.Evaluating Bluetooth as a Medium for Botnet Command and Control[J].in Proceedings of the Interna- tional Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2010.