M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and M. Karir, A Survey of Botnet Technology and Defenses, 2009 Cybersecurity Applications & Technology Conference for Homeland Security, pp.299-304, 2009.
DOI : 10.1109/CATCH.2009.40

C. Botnet, Internet census 2012-port scanning/0 using insecure embedded devices, 2013.

B. Fung, How stores use your phone's WiFi to track your shopping habits. http://www.washingtonpost.com/blogs/the- switch/wphow-stores-use-your- phones-wifi-to-track-your-shopping-habits, 2013.

E. Galperin and C. Quintin, Russian researchers uncover sophisticated NSA malware. https://www.eff.org/deeplinks/2015/02/russian- researchers-uncover-sophisticated-malwareequation-group, 2015.

D. Goodin, Spy software's Bluetooth capability allowed stalking of Iranian victims. http://arstechnica.com/security/2012/06/spy- softwares-bluetooth-capabilty-allowed-stalkof-iranian-victims, 2011.

D. Goodin, Bizarre attack infects Linksys routers with self-replicating malware. http://arstechnica.com/security/2014/02/ bizarre-attack-infects-linksys-routers-withself-replicating-malware, 2014.

M. Gruteser and D. Grunwald, Enhancing location privacy in wireless LAN through disposable interface identifiers, Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots , WMASH '03, pp.315-325, 2005.
DOI : 10.1145/941326.941334

H. Hu, S. Myers, V. Colizza, and A. Vespignani, WiFi networks and malware epidemiology, Proceedings of the National Academy of Sciences, pp.1318-1323, 2009.
DOI : 10.1073/pnas.0811973106

N. Husted and S. Myers, Mobile location tracking in metro areas, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.85-96, 2010.
DOI : 10.1145/1866307.1866318

J. Milliken, V. Selis, and A. Marshall, Detection and analysis of the Chameleon WiFi access point virus, EURASIP Journal on Information Security, vol.2013, issue.1, p.2013
DOI : 10.1073/pnas.0811973106

A. B. Musa and J. Eriksson, Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, 2012.
DOI : 10.1145/2426656.2426685

A. Sanatinia, S. Narain, and G. Noubir, Wireless spreading of WiFi APs infections using WPS flaws: An epidemiological and experimental study, 2013 IEEE Conference on Communications and Network Security (CNS), pp.430-437, 2013.
DOI : 10.1109/CNS.2013.6682757

J. Scahill and G. Greenwald, The NSA's Secret Role in the U.S. Assassination Program. https://firstlook.org/theintercept, 2011.

J. Valentino-devries, Stingray' Phone Tracker Fuels Constitutional Clash, 2011.

N. Bachy-yann, A. Vincent, K. Eric, C. Mohamed, and . Jean-christophe, Integrated access device security. Risk analysis and experiments. Revue des sciences et technologies de l'information, pp.63-88, 2014.

S. Zander, J. Grenville, P. Armitage, and . Branch, A survey of covert channels and countermeasures in computer network protocols, IEEE Communications Surveys & Tutorials, vol.9, issue.3, pp.44-57, 2007.
DOI : 10.1109/COMST.2007.4317620