An analysis of the Ikee.B (Duh) iPhone botnet, 2009. ,
Security Response: A Smart Worm for a Smartphone- WinCE, PmCryptic.A, 2008. ,
Symbian worm Yxes: Towards mobile botnets? In: 19th Annual EICAR Conference, 2010. ,
DOI : 10.1007/s11416-012-0163-2
Vulnerability Analysis of MMS User Agents, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 2006. ,
DOI : 10.1109/ACSAC.2006.55
Mobile botnets: an economic and technological assessment, 2008. ,
Consequences of Botnets Spreading to Mobile Devices, 14th Nordic Conference on Secure IT Systems, 2009. ,
Mobile botnets show their disruptive potential, New Scientist, vol.204, issue.2734, 2009. ,
DOI : 10.1016/S0262-4079(09)62990-0
On cellular botnets, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009. ,
DOI : 10.1145/1653662.1653690
Evaluating Bluetooth as a Medium for Botnet Command and Control, DIMVA'10, 2010. ,
DOI : 10.1007/978-3-642-14215-4_4
Design of SMS commanded-and-controlled and P2P-structured mobile botnets, Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12, 2010. ,
DOI : 10.1145/2185448.2185467
This is not the droid you are looking for, In: DEF CON, vol.18, 2010. ,
Evaluating Email's Feasibility for Botnet Command and Control, p.8, 2008. ,
DOI : 10.1109/dsn.2008.4630106
The Design of Rijndael: AES -The Advanced Encryption Standard, 2002. ,
DOI : 10.1007/978-3-662-04722-4
On random graphs I, Publicationes Mathematicae, vol.15, 1959. ,
Emergence of scaling in random networks, Science, vol.286, 1999. ,
Collective dynamics of 'small-world' networks, Nature, vol.393, issue.6684, 1998. ,
Structured Peer-to-Peer Overaly Networks: Ideal Botnets Command and Control Infrastructures?, ESORICS'08, 2008. ,
DOI : 10.1007/978-3-540-88313-5_30
The igraph library, 2005. ,
Rise of the iBots: 0wning a telco network, 2010. ,