Design of SMS commanded-and-controlled and P2P-structured mobile botnetsYuanyuan ZengKang G. Shinet al.2012WiSec 2012
Containment of network worms via per-process rate-limitingYuanyuan ZengXin Huet al.2008SecureComm 2008