5MULLINER C, SEIFERT J P, Rise of the iBots: Owning a telco Network[ C]//Proc of the 5th IEEE Int Conf on Malicious and Unwanted Software (Malware). Washing- ton DC : 1EEE Computer Society, 2010 : 71-80.
6TRAYNOR P, LIN M,ONGTANG M,et al. On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core[ C]//Proc of the 16th ACM Conf on CompL, ter and Communications Security. New York:ACM, 2009: 223-234.
7MILLER C. Mobile Attacks and Defense[J]. IEEE Se- curity & Privacy,9(04) :68-70.