Login / Signup
Bypass Cell-phone-verification Through a Smartphone-based Botnet.
Fu-Hau Hsu
Chi-Hsien Hsu
Chuan-Sheng Wang
Pei-Hsun Lee
Ruei-Min Jiang
Jia-Sian Jhang
Published in:
J. Inf. Sci. Eng. (2015)
Keyphrases
</>
mobile devices
model checking
peer to peer
daily life
information systems
mobile applications
network traffic
formal verification
person identification
multiscale
metadata
genetic algorithm
formal methods
formal analysis
ddos attacks
denial of service attacks
verification method