| [1] |
SYMBIAN. Sistema Operacional Symbian[EB/OL]. [2012-03-01].http://licensing.symbian.org.
|
| [2] |
DUNHAM K. Mobile malware attacks and defence[J]. Elsevier, 2009, 7(3): 137-146.[3] SPITZNER L. Honeypot: Tracking Hackers[M]. 北京: 清华大学出版社, 2004: 30-35.
|
| [4] |
诸葛建伟, 唐勇,韩心慧.蜜罐技术研究与应用进展[J]. 软件学报,2013, 24(4): 825-842.
|
| [5] |
MICHAEL V, JUSTIN M, JAY C, et al. Scalabilit Delity and Containment in the Potemkin Virtual Honeyfarm[C]//Proceedings of the ACMSymposiumon Operating System Principles, USA, 2005: 71-84.
|
| [6] |
PROVOS N. Honeyd: A Virtual Honeypot Daemon[R]. Addison-Wesley, 2003: 189-194.
|
| [7] |
Nepenhes Readme[EB/OL]. [2009-03-20].
|
| [8] |
ZOLFAGHARK, MOHAMMADI S. Securing Bluetooth-Based Payment System Using Honeypot[C]//International Conference on Innovations in Information Technology, San Francisco, 2009: 21-25.
|
| [9] |
GOBEL J. Automatic Capturing of Malicious Software[R]. Mannheim:University of Mannheim, 2010.
|
| [10] |
SPITZNER L. Honeypots: Catching the InsiderThreat[C]//2003 IEEE Computer Security Applications Conference, California, USA, 2003:170-179.
|
| [11] |
MULLINER C, LIEBERGELD S, LANGE M. HoneyDroid-Creating a Smartphone Honeypot[C]//IEEE Symposium on Security and Privacy,USA, 2011: 151-160.
|
| [12] |
WAHLISCH M, TRAPP S, KEIL C, et al. First Insights from a Mobile Honeypot[C]//ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. Helsinki,Finland ACM. 2012: 305-306.
|
| [13] |
WAHLISCH M, SCHMIDT T, VORBACH A, et al. Design,Implementation and Operation of a Mobile Honeypot[R]. 2013.
|
| [14] |
OCONNOR T. Honeym:A Framework for Implementing Virtual HoneyClients for Mobile Devices [C]//Proceedings of the Third ACM Conference on Wireless Network Security. New York, USA: ACM, 2010: 129-138.
|
| [15] |
MULLINER C, LANG S, POSTER M. Honeydroid-Creating A Smartphone Honeypot[C]//IEEE Symposium on Privacy and Security, Poster.Oakland, USA, 2011: 155-158.
|
| [16] |
YANG Z. PowerTutor -A Power Monitor for Android -Based Mobile Platforms[R]. Michigan: University of Michigan, 2012.
|