dc.contributor.author |
Pieterse, Heloise
|
|
dc.date.accessioned |
2012-11-01T07:23:59Z |
|
dc.date.available |
2012-11-01T07:23:59Z |
|
dc.date.issued |
2012-10 |
|
dc.identifier.citation |
Pieterse, H. A study of mobile botnets: analysis of attack strategies. 4th CSIR Biennial Conference: Real problems relevant solutions, CSIR, Pretoria, 9-10 October 2012 |
en_US |
dc.identifier.uri |
http://hdl.handle.net/10204/6264
|
|
dc.description |
4th CSIR Biennial Conference: Real problems relevant solutions, CSIR, Pretoria, 9-10 October 2012 |
en_US |
dc.description.abstract |
Until recently, mobile phones remained free
of the threat of botnets due to the isolation
between mobile networks and the internet. The
situation has changed significantly with the
fast-growing popularity of smartphones such as Android-based phones and Apple’s Phone. The purpose of this study is to focus on the classification of possible attacks caused by mobile botnets. |
en_US |
dc.language.iso |
en |
en_US |
dc.subject |
Botnets |
en_US |
dc.subject |
Mobile phones |
en_US |
dc.subject |
Smartphones |
en_US |
dc.subject |
Attack strategies |
en_US |
dc.title |
A study of mobile botnets: analysis of attack strategies |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Pieterse, H. (2012). A study of mobile botnets: analysis of attack strategies. http://hdl.handle.net/10204/6264 |
en_ZA |
dc.identifier.chicagocitation |
Pieterse, Heloise. "A study of mobile botnets: analysis of attack strategies." (2012): http://hdl.handle.net/10204/6264 |
en_ZA |
dc.identifier.vancouvercitation |
Pieterse H, A study of mobile botnets: analysis of attack strategies; 2012. http://hdl.handle.net/10204/6264 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Pieterse, Heloise
AB - Until recently, mobile phones remained free
of the threat of botnets due to the isolation
between mobile networks and the internet. The
situation has changed significantly with the
fast-growing popularity of smartphones such as Android-based phones and Apple’s Phone. The purpose of this study is to focus on the classification of possible attacks caused by mobile botnets.
DA - 2012-10
DB - ResearchSpace
DP - CSIR
KW - Botnets
KW - Mobile phones
KW - Smartphones
KW - Attack strategies
LK - https://researchspace.csir.co.za
PY - 2012
T1 - A study of mobile botnets: analysis of attack strategies
TI - A study of mobile botnets: analysis of attack strategies
UR - http://hdl.handle.net/10204/6264
ER -
|
en_ZA |