P. Porras, H. Saidi, and V. Yegneswaran, An analysis of the Ikee.B (Duh) iPhone botnet, 2009.

A. Lelli, Security Response: A Smart Worm for a Smartphone- WinCE, PmCryptic.A, 2008.

A. Apvrille, Symbian worm Yxes: Towards mobile botnets? In: 19th Annual EICAR Conference, 2010.
DOI : 10.1007/s11416-012-0163-2

C. Mulliner and G. Vigna, Vulnerability Analysis of MMS User Agents, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 2006.
DOI : 10.1109/ACSAC.2006.55

M. Vanhorenbeeck, Mobile botnets: an economic and technological assessment, 2008.

A. R. Flo and A. Josang, Consequences of Botnets Spreading to Mobile Devices, 14th Nordic Conference on Secure IT Systems, 2009.

M. Campbell, Mobile botnets show their disruptive potential, New Scientist, vol.204, issue.2734, 2009.
DOI : 10.1016/S0262-4079(09)62990-0

P. Traynor, M. Lin, and M. Ongtang, On cellular botnets, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009.
DOI : 10.1145/1653662.1653690

K. Singh, S. Sangal, and N. Jain, Evaluating Bluetooth as a Medium for Botnet Command and Control, DIMVA'10, 2010.
DOI : 10.1007/978-3-642-14215-4_4

Y. Zeng, X. Hu, and K. G. Shin, Design of SMS commanded-and-controlled and P2P-structured mobile botnets, Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12, 2010.
DOI : 10.1145/2185448.2185467

C. Papathanasiou and N. J. Percoco, This is not the droid you are looking for, In: DEF CON, vol.18, 2010.

K. Singh, A. Srivastava, and J. Giffin, Evaluating Email's Feasibility for Botnet Command and Control, p.8, 2008.
DOI : 10.1109/dsn.2008.4630106

J. Daemen and V. Rijmen, The Design of Rijndael: AES -The Advanced Encryption Standard, 2002.
DOI : 10.1007/978-3-662-04722-4

P. Erdos and A. Renyi, On random graphs I, Publicationes Mathematicae, vol.15, 1959.

A. L. Barabasi and R. Albert, Emergence of scaling in random networks, Science, vol.286, 1999.

D. J. Watts and S. H. Strogatz, Collective dynamics of 'small-world' networks, Nature, vol.393, issue.6684, 1998.

C. Davis, S. Neville, and J. M. Fernadez, Structured Peer-to-Peer Overaly Networks: Ideal Botnets Command and Control Infrastructures?, ESORICS'08, 2008.
DOI : 10.1007/978-3-540-88313-5_30

G. Csardi, The igraph library, 2005.

C. Mulliner and J. P. Seifertrise, Rise of the iBots: 0wning a telco network, 2010.