Articoli di riviste sul tema "Mobile botnet"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Mobile botnet".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Wang, Yichuan, Yefei Zhang, Wenjiang Ji, Lei Zhu e Yanxiao Liu. "Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology". Wireless Communications and Mobile Computing 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/7805408.
Testo completoKarim, Ahmad, Victor Chang e Ahmad Firdaus. "Android Botnets". Journal of Organizational and End User Computing 32, n. 3 (luglio 2020): 50–67. http://dx.doi.org/10.4018/joeuc.2020070105.
Testo completoWu, Min-Hao, Chia-Hao Lee, Fu-Hau Hsu, Kai-Wei Chang, Tsung-Huang Huang, Ting-Cheng Chang e Li-Min Yi. "Simple and Ingenious Mobile Botnet Covert Network Based on Adjustable Unit (SIMBAIDU)". Mathematical Problems in Engineering 2021 (3 agosto 2021): 1–6. http://dx.doi.org/10.1155/2021/9920883.
Testo completoYerima, Suleiman Y., Mohammed K. Alzaylaee, Annette Shajan e Vinod P. "Deep Learning Techniques for Android Botnet Detection". Electronics 10, n. 4 (23 febbraio 2021): 519. http://dx.doi.org/10.3390/electronics10040519.
Testo completoLi, Na, Yan Hui Du e Guang Xun Chen. "CPbot: The Construction of Mobile Botnet Using GCM". Applied Mechanics and Materials 635-637 (settembre 2014): 1526–29. http://dx.doi.org/10.4028/www.scientific.net/amm.635-637.1526.
Testo completoSun, Fenggang, Lidong Zhai, Yuejin Du, Peng Wang e Jun Li. "Design of Mobile Botnet Based on Open Service". International Journal of Digital Crime and Forensics 8, n. 3 (luglio 2016): 1–10. http://dx.doi.org/10.4018/ijdcf.2016070101.
Testo completoYusof, Muhammad, Madihah Mohd Saudi e Farida Ridzuan. "Mobile Botnet Classification by using Hybrid Analysis". International Journal of Engineering & Technology 7, n. 4.15 (7 ottobre 2018): 103. http://dx.doi.org/10.14419/ijet.v7i4.15.21429.
Testo completoLin, Kuan-Cheng, Sih-Yang Chen e Jason C. Hung. "Botnet Detection Using Support Vector Machines with Artificial Fish Swarm Algorithm". Journal of Applied Mathematics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/986428.
Testo completoBernardeschi, Cinzia, Francesco Mercaldo, Vittoria Nardone e Antonella Santone. "Exploiting Model Checking for Mobile Botnet Detection". Procedia Computer Science 159 (2019): 963–72. http://dx.doi.org/10.1016/j.procs.2019.09.263.
Testo completoJiang, Ruei Min, Jia Sian Jhang, Fu Hau Hsu, Yan Ling Hwang, Pei Wen Huang e Yung Hoh Sheu. "JokerBot – An Android-Based Botnet". Applied Mechanics and Materials 284-287 (gennaio 2013): 3454–58. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3454.
Testo completoFaghani, Mohammad R., e Uyen T. Nguyen. "Mobile botnets meet social networks: design and analysis of a new type of botnet". International Journal of Information Security 18, n. 4 (20 giugno 2018): 423–49. http://dx.doi.org/10.1007/s10207-018-0412-6.
Testo completoAnagnostopoulos, Marios, Georgios Kambourakis e Stefanos Gritzalis. "New facets of mobile botnet: architecture and evaluation". International Journal of Information Security 15, n. 5 (31 dicembre 2015): 455–73. http://dx.doi.org/10.1007/s10207-015-0310-0.
Testo completoSantos, Augusto Almeida, Michele Nogueira e Jose M. F. Moura. "A Stochastic Adaptive Model to Explore Mobile Botnet Dynamics". IEEE Communications Letters 21, n. 4 (aprile 2017): 753–56. http://dx.doi.org/10.1109/lcomm.2016.2637367.
Testo completoAlzahrani, Abdullah J., e Ali A. Ghorbani. "SMS-Based Mobile Botnet Detection Framework Using Intelligent Agents". Journal of Cyber Security and Mobility 5, n. 2 (2017): 47–74. http://dx.doi.org/10.13052/jcsm2245-1439.523.
Testo completoEslahi, Meisam, Moslem Yousefi, Maryam Var Naseri, Y. M. Yussof, N. M. Tahir e H. Hashim. "Mobile Botnet Detection Model based on Retrospective Pattern Recognition". International Journal of Security and Its Applications 10, n. 9 (30 settembre 2016): 39–44. http://dx.doi.org/10.14257/ijsia.2016.10.9.05.
Testo completoChoi, Byungha, e Kyungsan Cho. "Comparison of HMM and SVM schemes in detecting mobile Botnet". Journal of the Korea Society of Computer and Information 19, n. 4 (30 aprile 2014): 81–90. http://dx.doi.org/10.9708/jksci.2014.19.4.081.
Testo completoYusof, Muhammad Bin, Madihah binti Mohd Saudi e Farida Ridzuan. "A Systematic Review and Analysis of Mobile Botnet Detection for GPS Exploitation". Advanced Science Letters 23, n. 5 (1 maggio 2017): 4696–700. http://dx.doi.org/10.1166/asl.2017.8955.
Testo completoKarim, Ahmad, Rosli Salleh e Muhammad Khurram Khan. "SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications". PLOS ONE 11, n. 3 (15 marzo 2016): e0150077. http://dx.doi.org/10.1371/journal.pone.0150077.
Testo completoMahboubi, Arash, Seyit Camtepe e Keyvan Ansari. "Stochastic Modeling of IoT Botnet Spread: A Short Survey on Mobile Malware Spread Modeling". IEEE Access 8 (2020): 228818–30. http://dx.doi.org/10.1109/access.2020.3044277.
Testo completoKavitha, G. "Multi Attribute Real Time Traffic Inference Algorithm for Botnet Detection in Mobile Ad Hoc Network". Wireless Personal Communications 102, n. 4 (3 febbraio 2018): 3465–76. http://dx.doi.org/10.1007/s11277-018-5384-3.
Testo completoZhou, Renjie, Xiao Wang, Jingjing Yang, Wei Zhang e Sanyuan Zhang. "Characterizing Network Anomaly Traffic with Euclidean Distance-Based Multiscale Fuzzy Entropy". Security and Communication Networks 2021 (16 giugno 2021): 1–9. http://dx.doi.org/10.1155/2021/5560185.
Testo completoFarina, Paolo, Enrico Cambiaso, Gianluca Papaleo e Maurizio Aiello. "Mobile Botnets Development: Issues and Solutions". International Journal of Future Computer and Communication 3, n. 6 (dicembre 2014): 385–90. http://dx.doi.org/10.7763/ijfcc.2014.v3.333.
Testo completoWang, Yichuan, Han Yu, Xinhong Hei, Binbin Bai e Wenjiang Ji. "From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT". Security and Communication Networks 2021 (2 agosto 2021): 1–13. http://dx.doi.org/10.1155/2021/9179286.
Testo completoMtibaa, Abderrahmen. "MobiBots: Towards detecting distributed mobile botnets". Qatar Foundation Annual Research Forum Proceedings, n. 2013 (novembre 2013): ICTO 05. http://dx.doi.org/10.5339/qfarf.2013.icto-05.
Testo completoApvrille, Axelle. "Symbian worm Yxes: towards mobile botnets?" Journal in Computer Virology 8, n. 4 (1 maggio 2012): 117–31. http://dx.doi.org/10.1007/s11416-012-0163-2.
Testo completoCampbell, MacGregor. "Mobile botnets show their disruptive potential". New Scientist 204, n. 2734 (novembre 2009): 26. http://dx.doi.org/10.1016/s0262-4079(09)62990-0.
Testo completoMtibaa, Abderrahmen, Khaled A. Harras e Hussein Alnuweiri. "From botnets to MobiBots: a novel malicious communication paradigm for mobile botnets". IEEE Communications Magazine 53, n. 8 (agosto 2015): 61–67. http://dx.doi.org/10.1109/mcom.2015.7180509.
Testo completoLiao, Qi, e Zhen Li. "Portfolio optimization of computer and mobile botnets". International Journal of Information Security 13, n. 1 (18 agosto 2013): 1–14. http://dx.doi.org/10.1007/s10207-013-0206-9.
Testo completoChen, Wei, Xiapu Luo, Chengyu Yin, Bin Xiao, Man Ho Au e Yajuan Tang. "CloudBot: Advanced mobile botnets using ubiquitous cloud technologies". Pervasive and Mobile Computing 41 (ottobre 2017): 270–85. http://dx.doi.org/10.1016/j.pmcj.2017.03.007.
Testo completoCosta, Victor G. Turrisi Da, Sylvio Barbon
Zarpel�ão, Bruno Bogaz, Victor G. Turrisi Da Costa, Sylvio Barbon
Mitrea, Teodor, e Monica Borda. "Mobile Security Threats: A Survey on Protection and Mitigation Strategies". International conference KNOWLEDGE-BASED ORGANIZATION 26, n. 3 (1 giugno 2020): 131–35. http://dx.doi.org/10.2478/kbo-2020-0127.
Testo completoLu, Zhuo, Wenye Wang e Cliff Wang. "On the Evolution and Impact of Mobile Botnets in Wireless Networks". IEEE Transactions on Mobile Computing 15, n. 9 (1 settembre 2016): 2304–16. http://dx.doi.org/10.1109/tmc.2015.2492545.
Testo completoChen, Wei, Peihua Gong, Le Yu e Geng Yang. "An adaptive push-styled command and control mechanism in mobile botnets". Wuhan University Journal of Natural Sciences 18, n. 5 (ottobre 2013): 427–34. http://dx.doi.org/10.1007/s11859-013-0952-6.
Testo completoFarina, Paolo, Enrico Cambiaso, Gianluca Papaleo e Maurizio Aiello. "Are mobile botnets a possible threat? The case of SlowBot Net". Computers & Security 58 (maggio 2016): 268–83. http://dx.doi.org/10.1016/j.cose.2016.02.005.
Testo completoPerez, Manuel Gil, Alberto Huertas Celdran, Fabrizio Ippoliti, Pietro G. Giardina, Giacomo Bernini, Ricardo Marco Alaez, Enrique Chirivella-Perez et al. "Dynamic Reconfiguration in 5G Mobile Networks to Proactively Detect and Mitigate Botnets". IEEE Internet Computing 21, n. 5 (2017): 28–36. http://dx.doi.org/10.1109/mic.2017.3481345.
Testo completoHu, Jinlong, Tenghui Li, Yi Zhuang, Song Huang e Shoubin Dong. "GFD: A Weighted Heterogeneous Graph Embedding Based Approach for Fraud Detection in Mobile Advertising". Security and Communication Networks 2020 (4 settembre 2020): 1–12. http://dx.doi.org/10.1155/2020/8810817.
Testo completoZuzcák, Matej, e Petr Bujok. "Using honeynet data and a time series to predict the number of cyber attacks". Computer Science and Information Systems, n. 00 (2021): 40. http://dx.doi.org/10.2298/csis200715040z.
Testo completoSolomon, Zakkam, Meghana K M, Manjula e Roshini B. "SURVEY ON E-FINGERPRINT TICKET". International Journal of Research -GRANTHAALAYAH 5, n. 4RACSIT (30 aprile 2017): 53–57. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3351.
Testo completoSowmya, K. V., A. Chandu, A. Nagasai, C. H. Sri Harsha Preetham e K. Supreeth. "Smart Home System Using Clustering Based on Internet of Things". Journal of Computational and Theoretical Nanoscience 17, n. 5 (1 maggio 2020): 2369–74. http://dx.doi.org/10.1166/jctn.2020.8897.
Testo completoChen, Jun, Huan Wu, Xi Zhou, Maoguo Wu, Chenyang Zhao e Shiyan Xu. "Optimization of Internet of Things E-Commerce Logistics Cloud Service Platform Based on Mobile Communication". Complexity 2021 (20 marzo 2021): 1–11. http://dx.doi.org/10.1155/2021/5542914.
Testo completoSantos, Ronaldo Antonio dos, Marcos Vinícius Folegatti, Tarlei Arriel Botrel, Roberto Terumi Atarassi e José Alves Júnior. "PROJETO, CONSTRUÇÃO E CALIBRAÇÃO DE UM LISÍMETRO MÓVEL DE PESAGEM, COM CÉLULA DE CARGA HIDRÁULICA, PARA DETERMINAÇÃO DA DEMANDA HÍDRICA DE MUDAS CÍTRICAS EM CASA DE VEGETAÇÃO". IRRIGA 12, n. 2 (10 agosto 2007): 202–15. http://dx.doi.org/10.15809/irriga.2007v12n2p202-215.
Testo completoDekker, Travis J., Kamran S. Hamid, Andrew E. Federer, John R. Steele, Mark E. Easley, James A. Nunley e Samuel B. Adams. "The Value of Motion: Patient-Reported Outcome Measures Are Correlated With Range of Motion in Total Ankle Replacement". Foot & Ankle Specialist 11, n. 5 (25 dicembre 2017): 451–56. http://dx.doi.org/10.1177/1938640017750258.
Testo completoHamid, Kamran, Travis Dekker, Mark Easley, James Nunley e Samuel Adams. "The Value of Motion". Foot & Ankle Orthopaedics 2, n. 3 (1 settembre 2017): 2473011417S0000. http://dx.doi.org/10.1177/2473011417s000046.
Testo completoAripin, Norizah, e Ummi Madihah Daud. "SIKAP PENGGUNAAN RADIO ATAS TALIAN “THR GEGAR” DALAM KALANGAN MAHASISWA UNIVERSITI". Asian People Journal (APJ) 3, SI1 (30 dicembre 2020): 19–32. http://dx.doi.org/10.37231/apj.2020.3.si1.234.
Testo completoAnggoro, Muhammad Agung, e Mas Intan Purba. "THE IMPACT OF ATTRACTIVENESS OF ADS AND CUSTOMER COMMENTS AGAINST TO PURCHASE DECISION OF CUSTOMER PRODUCTS ON THE USER OF ONLINE SHOP APPLICATIONS IN THE CITY OF MEDAN". Jurnal Ilmiah Bina Manajemen 3, n. 1 (13 marzo 2020): 1–9. http://dx.doi.org/10.33557/jibm.v3i1.823.
Testo completoBeaugrand, Claire. "The Absurd Injunction to Not Belong and the Bidūn in Kuwait". International Journal of Middle East Studies 52, n. 4 (novembre 2020): 726–32. http://dx.doi.org/10.1017/s0020743820001014.
Testo completoGil Zapirain, Oier. "Simulación de la protesta sociopolítica". AUSART 4, n. 1 (12 luglio 2016): 175–85. http://dx.doi.org/10.1387/ausart.16698.
Testo completoPaulino, Rita De Cássia Romeiro, e Marina Lisboa Empinotti. "PRODUTOS JORNALÍSTICOS PARA TABLETS COMO FERRAMENTAS PEDAGÓGICAS: estudo de caso do Golpe de 1964". Revista Observatório 3, n. 6 (1 ottobre 2017): 636. http://dx.doi.org/10.20873/uft.2447-4266.2017v3n6p636.
Testo completo"XSS MBot: Mobile Botnet for Stealthy DDoS Attacks". International Journal of Innovative Technology and Exploring Engineering 8, n. 9 (10 luglio 2019): 2832–36. http://dx.doi.org/10.35940/ijitee.i8669.078919.
Testo completo