中国互联网络信息中心.第38次中国互联网络发展状况统计报告[R].北京:中国互联网络信息中心,2016.CNNIC.Statistical report of the 38th China Internet development[R].Beijing:CNNIC,2016(Ch).
[2]
MULLINER C,SEIFERTIN J P.Rise of the iBots:Owning a telco network[C]//Proceedings of the 5th IEEE International Conference on Malicious and Unwanted So ftware(Malware).Washington D C:IEEE,2010:71-80.DOI:10.1109/MALWARE.2010.5665790.
[3]
ZHAO S,LEE PP C,LUI J,et al.Cloud-based push-styled mobile botnets:A case study of exploiting the cloud to device messaging service[C]//Proceedings of the 28th Annual Computer Security Applications Conference.New York:ACM,2012:119-128.
[4]
SAFAKA I,FRAGOULI C,ARGYRAKI K.Matryoshka:Hiding Secret Communication in Plain Sight[DB/OL].[2017-02-03].http://pdfs.semanticscholar.org/10c6/a2c188bb5aca469ff7b29d87d3de6c800e74.
[5]
CHEN W,GONG P,YU L,et al.An adaptive pushstyled command and control mechanism in mobile botnets[J].Wuhan University Journal of Natural Sciences,2013,18(5):427-434.
[6]
张东娜.基于WordNet的短文本语义相似性计算研究[D].长春:吉林大学,2010.ZHANG D N.The Research of Semantic Similarity Between Short Text Based on Word Net[D].Changchun:Jilin University,2010(Ch).
[7]
CUI X,FANG BX,YIN LH,et al.Andbot:towards advanced mobile botnets[C]//Proceedings of the 4th USENIX conference on Large-scale Exploits and Emergent Threats.Boston:USENIX Association:2011:11.
GROSVALD M,ORGUN C O.Free from the cover text:A human-generated natural language approach to text-based steganography[J].Journal o f In formation Hiding and Multimedia Signal Processing,2011,2(2):133-141.
[10]
APPLE INC.Local and Push Notification Programming Guide[EB/OL].[2017-06-02].https://developer.apple.com/library/content/documentation/Networking Internet/Conceptual/RemoteNotificationsPG/AP NSOverview.html#//apple_ref/doc/uid/TP40008194-CH8-SW1.
[11]
深圳市和讯华谷信息技术有限公司.Jpush产品简介[EB/OL].[2017-05-02].https://docs.jiguang.cn/jpush/guideline/intro/.HEXUN HUAGU INFORMATION TECHNOLOGY Co.,ctd.Jpush production Introduction[EB/OL].[2017-05-02].https://docs.jiguang.cn/j push/guideline/intro/(Ch).
[12]
SINGH K,SRIVASTAVA A,GIFFIN J,et al.Evaluating email's feasibility for botnet command and control[C]//Proceedings of IEEE International Conference on Dependable Systems and Networks,2008(DSN 2008).Washington D C:IEEE,2008:376-385.
[13]
陈伟,周诗文,殷承宇.流量自适应的移动僵尸网络云控机制研究[J].通信学报,2014,35(11):32-38.CHEN W,ZHOU S W,YIN C Y.Research on cloudbased traffic adaptive command and control method for mobile botnet[J].Journal on Communications,2014,35(11):32-38(Ch).
[14]
李娜,杜彦辉,陈默.基于短地址混淆和谷歌云推送的移动僵尸网络的构建[J].计算机应用,2015,35(6):1698-1704.LI N,DU Y H,CHEN M.Construction of mobile botnet based on URL shortening services flux and Google cloud messaging for Android[J].Journal of Computer Applications,2015,35(6):1698-1704(Ch).
[15]
CHAND V,ORGUN C O.Exploiting linguistic features in lexical steganography:Design and proof-ofconcept implementation[C]//Proceedings of the 39th Annual Hawaii International Conference on System Sciences.Washington,D C:IEEE Computer Society,2006:126.DOI:10.1109/HICSS.2006.175.
[16]
APVRILLE A.Symbian worm Yxes:Towards mobile botnets?[J].Journal in Computer Virology,2012,8(4):117-131.
[17]
PORRAS P,SAIDI H,YEGNESWARAN V.An Analysis of the iKee.B Iphone Botnet[DB/OL].[2017-07-02].http://www.csl.sri.com/users/vinod/papers/ikee.pdf.DOI:10.1007/978-3-642-17502-2_12.
[18]
WYATT T.Security Alert:Geinimi,Sophisticated New Android Trojan Found in Wild[EB/OL].[2010-12-29].https://blog.lookout.com/security-alert-geinimi-sophisticated-new-android-trojan-found-in-wild.
[19]
GOOGLE INC.Android Cloud to Device Messaging Framework[EB/OL].[2017-07-05].https://developers.goople.com/cloud-messaging/gcm.
[20]
MICROSOFT INC.Push Notifications Overview for Windows Phone[EB/OL].[2017-07-06].http://msdn.microsoft.com/enus/library/ff402558(v=vs.92).aspx.
INDIGO ROSE SOFTWARE CORP.Airbop[EB/OL].[2017-06-02].http://airbop.com.
[23]
王李冬.融合语义和时间因子的微博检索[J].情报杂志,2016,35(4):190-194.WANG L D.Microblog retrieval based on the combination of semantics and temporalfactor[J].Journal of Intellipence,2016,35(4):190-194(Ch).
[24]
LIN D K.An Information-Theoretic Definition of Similarity[DB/OL].[2017-06-19].http://www.mathcs.emory.edu/~choi/courses/reading/lin-98a.pdf.