2Abdelrahman O H, Gelenbe E, G~rbil G, et al. Mobile network anomaly detection and mitigation: the NEMESYS approach[ M ]. Information Sciences and Systems 2013.Springer Information Publishing, 2013:429-439.
4Google Inc. Android Cloud to Device Messaging Frame- work [ EB/OL ]. http: Jj code. google, corn/android/ c2dm.
5Apple Inc. Local and Push Notification Programming Guide[ EB/OL ]. http:// developer, apple, corn/library/ mac/doeumentation/Networkinglnternet/Conceptual/Re- moteNotificationsPG/RemoteNotificationsPG, pdf, 2011.
6Microsoft Inc. Push Notifications Overview for Windows Phone [ EB/OL ] http : // msdn. microsoft, com/en-us/li- brary/ff402558 ( v = vs. 92 ). aspx.
7Research In Motion Inc. Blackberry push service [ EB/ OL]. http: // us. blackberry, com/developers/platform/ pushapi, jsp.
8Zhao S, Lee P P, Lui J, et al. Cloud-based push-styled mobile botnets : a case study of exploiting the cloud to de- vice messaging service[ C] //Proceedings of the 28th An- nual Computer Security Applications Conference, 2012: 119 - 128.
9Lee H, Kang T, Lee S, et al. Punobot: Mobile Botnet Using Push Notification Service in Android[M]. Informa- tion Security Applications. Springer International Publish- ing, 2014:124 - 137.
10Kartaltepe E J, Morales J A, Xu S, et al. Social net- work-based botnet command-and-control: emerging threats and countermeasures[M]. Applied Cryptography and Network Security. Springer International Publish- ing, 2010:511 -528.