A Survey of Botnet Technology and Defenses, 2009 Cybersecurity Applications & Technology Conference for Homeland Security, pp.299-304, 2009. ,
DOI : 10.1109/CATCH.2009.40
Internet census 2012-port scanning/0 using insecure embedded devices, 2013. ,
How stores use your phone's WiFi to track your shopping habits. http://www.washingtonpost.com/blogs/the- switch/wphow-stores-use-your- phones-wifi-to-track-your-shopping-habits, 2013. ,
Russian researchers uncover sophisticated NSA malware. https://www.eff.org/deeplinks/2015/02/russian- researchers-uncover-sophisticated-malwareequation-group, 2015. ,
Spy software's Bluetooth capability allowed stalking of Iranian victims. http://arstechnica.com/security/2012/06/spy- softwares-bluetooth-capabilty-allowed-stalkof-iranian-victims, 2011. ,
Bizarre attack infects Linksys routers with self-replicating malware. http://arstechnica.com/security/2014/02/ bizarre-attack-infects-linksys-routers-withself-replicating-malware, 2014. ,
Enhancing location privacy in wireless LAN through disposable interface identifiers, Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots , WMASH '03, pp.315-325, 2005. ,
DOI : 10.1145/941326.941334
WiFi networks and malware epidemiology, Proceedings of the National Academy of Sciences, pp.1318-1323, 2009. ,
DOI : 10.1073/pnas.0811973106
Mobile location tracking in metro areas, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.85-96, 2010. ,
DOI : 10.1145/1866307.1866318
Detection and analysis of the Chameleon WiFi access point virus, EURASIP Journal on Information Security, vol.2013, issue.1, p.2013 ,
DOI : 10.1073/pnas.0811973106
Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, 2012. ,
DOI : 10.1145/2426656.2426685
Wireless spreading of WiFi APs infections using WPS flaws: An epidemiological and experimental study, 2013 IEEE Conference on Communications and Network Security (CNS), pp.430-437, 2013. ,
DOI : 10.1109/CNS.2013.6682757
The NSA's Secret Role in the U.S. Assassination Program. https://firstlook.org/theintercept, 2011. ,
Stingray' Phone Tracker Fuels Constitutional Clash, 2011. ,
Integrated access device security. Risk analysis and experiments. Revue des sciences et technologies de l'information, pp.63-88, 2014. ,
A survey of covert channels and countermeasures in computer network protocols, IEEE Communications Surveys & Tutorials, vol.9, issue.3, pp.44-57, 2007. ,
DOI : 10.1109/COMST.2007.4317620