2022
DOI: 10.1007/s10207-022-00624-4
|View full text |Cite
|
Sign up to set email alerts
|

Mobile botnet detection: a comprehensive survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 113 publications
0
0
0
Order By: Relevance
“…❖ Botnets: A mobile botnet is a collection of smartphone and tablet computers corrupted by a malicious program. An attacker known as the Botmaster commands a mobile botnet to conduct illegal operations such as eavesdropping, transmitting malicious codes via SMS, DDoS attacks, and stealing sensitive information [64]. ❖ Spyware: The attacker uses freely available online spyware to gain control of the victim's mobile phone, allowing them to control SMS, emails, listen to phone conversations, and monitor the victim's location using GPS.…”
Section: Mobile Phishing Techniquesmentioning
confidence: 99%
“…❖ Botnets: A mobile botnet is a collection of smartphone and tablet computers corrupted by a malicious program. An attacker known as the Botmaster commands a mobile botnet to conduct illegal operations such as eavesdropping, transmitting malicious codes via SMS, DDoS attacks, and stealing sensitive information [64]. ❖ Spyware: The attacker uses freely available online spyware to gain control of the victim's mobile phone, allowing them to control SMS, emails, listen to phone conversations, and monitor the victim's location using GPS.…”
Section: Mobile Phishing Techniquesmentioning
confidence: 99%