Journal articles on the topic 'Smishing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 28 journal articles for your research on the topic 'Smishing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Jain, Ankit Kumar, Sumit Kumar Yadav, and Neelam Choudhary. "A Novel Approach to Detect Spam and Smishing SMS using Machine Learning Techniques." International Journal of E-Services and Mobile Applications 12, no. 1 (January 2020): 21–38. http://dx.doi.org/10.4018/ijesma.2020010102.
Full textJain, Ankit Kumar, and B. B. Gupta. "Feature Based Approach for Detection of Smishing Messages in the Mobile Environment." Journal of Information Technology Research 12, no. 2 (April 2019): 17–35. http://dx.doi.org/10.4018/jitr.2019040102.
Full textLee, Ji-Won, Dong-Hoon Lee, and In-Suk Kim. "Method of Detecting SmiShing using SVM." Journal of Security Engineering 10, no. 6 (December 31, 2013): 655–68. http://dx.doi.org/10.14257/jse.2013.12.01.
Full textMishra, Sandhya, and Devpriya Soni. "Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis." Future Generation Computer Systems 108 (July 2020): 803–15. http://dx.doi.org/10.1016/j.future.2020.03.021.
Full textPark, Hyo-Min, Wan-Seok Kim, So-Jeong Kang, and Sang Uk Shin. "Cloud Messaging Service for Preventing Smishing Attack." Journal of Digital Convergence 15, no. 4 (April 28, 2017): 285–93. http://dx.doi.org/10.14400/jdc.2017.15.4.285.
Full textPark, Dea-Woo. "Analysis on Mobile Forensic of Smishing Hacking Attack." Journal of the Korea Institute of Information and Communication Engineering 18, no. 12 (December 31, 2014): 2878–84. http://dx.doi.org/10.6109/jkiice.2014.18.12.2878.
Full textMcVey, Tom. "Smishing uses short-lived URLs to avoid detection." Network Security 2021, no. 7 (July 2021): 6. http://dx.doi.org/10.1016/s1353-4858(21)00073-8.
Full textPark, Dea-Woo. "Analysis of Mobile Smishing Hacking Trends and Security Measures." Journal of the Korea Institute of Information and Communication Engineering 19, no. 11 (November 30, 2015): 2615–22. http://dx.doi.org/10.6109/jkiice.2015.19.11.2615.
Full textMoon, Soon-ho, and Dea-woo Park. "Forensic Analysis of MERS Smishing Hacking Attacks and Prevention." International Journal of Security and Its Applications 10, no. 6 (June 30, 2016): 181–92. http://dx.doi.org/10.14257/ijsia.2016.10.6.18.
Full textSonowal, Gunikhan, and K. S. Kuppusamy. "SmiDCA: An Anti-Smishing Model with Machine Learning Approach." Computer Journal 61, no. 8 (April 25, 2018): 1143–57. http://dx.doi.org/10.1093/comjnl/bxy039.
Full textLee, Si-Young, Hee-Soo Kang, and Jong-Sub Moon. "A Study on Smishing Block of Android Platform Environment." Journal of the Korea Institute of Information Security and Cryptology 24, no. 5 (October 31, 2014): 975–85. http://dx.doi.org/10.13089/jkiisc.2014.24.5.975.
Full textPark, In-Woo, and Dea-Woo Park. "A Study of Intrusion Security Research and Smishing Hacking Attack on a Smartphone." Journal of the Korea Institute of Information and Communication Engineering 17, no. 11 (November 30, 2013): 2588–94. http://dx.doi.org/10.6109/jkiice.2013.17.11.2588.
Full textKim, Do-Young, and Sung-Mok Cho. "A Proposal of Smart Phone App for Preventing Smishing Attack." Journal of Security Engineering 12, no. 3 (June 30, 2015): 207–20. http://dx.doi.org/10.14257/jse.2015.06.08.
Full textUstundag Soykan, Elif, and Mustafa Bagriyanik. "The Effect of SMiShing Attack on Security of Demand Response Programs." Energies 13, no. 17 (September 2, 2020): 4542. http://dx.doi.org/10.3390/en13174542.
Full textJain, Ankit Kumar, and B. B. Gupta. "Rule-Based Framework for Detection of Smishing Messages in Mobile Environment." Procedia Computer Science 125 (2018): 617–23. http://dx.doi.org/10.1016/j.procs.2017.12.079.
Full textChoi, Hark-Kyu, and Hwang-Rae Kim. "Design and Implementation of a Malicious SMS Training System for Preventing Smishing." Journal of Korean Institute of Information Technology 17, no. 10 (October 31, 2019): 93–99. http://dx.doi.org/10.14801/jkiit.2019.17.10.93.
Full textJoo, Jae Woong, Seo Yeon Moon, Saurabh Singh, and Jong Hyuk Park. "S-Detector: an enhanced security model for detecting Smishing attack for mobile computing." Telecommunication Systems 66, no. 1 (January 11, 2017): 29–38. http://dx.doi.org/10.1007/s11235-016-0269-9.
Full textKang, Ji Won, Ae Ri Lee, and Beomsoo Kim. "Improving Security Awareness about Smishing through Experiment on the Optimistic Bias on Risk Perception." Journal of the Korea Institute of Information Security and Cryptology 26, no. 2 (April 30, 2016): 475–87. http://dx.doi.org/10.13089/jkiisc.2016.26.2.475.
Full textJoo, Choon Kyong, and Ji Won Yoon. "Discrimination of SPAM and prevention of smishing by sending personally identified SMS(For financial sector)." Journal of the Korea Institute of Information Security and Cryptology 24, no. 4 (August 31, 2014): 645–53. http://dx.doi.org/10.13089/jkiisc.2014.24.4.645.
Full textOjugo, Arnold Adimabua, and Andrew Okonji Eboka. "Memetic algorithm for short messaging service spam filter using text normalization and semantic approach." International Journal of Informatics and Communication Technology (IJ-ICT) 9, no. 1 (April 1, 2020): 9. http://dx.doi.org/10.11591/ijict.v9i1.pp9-18.
Full textSeo, Gil-Won, and Il-Young Moon. "A Study of Technical Countermeasure System for the Smishing Detection and Prevention Based on the Android Platform." Journal of Korea Navigation Institute 18, no. 6 (December 30, 2014): 569–75. http://dx.doi.org/10.12673/jant.2014.18.6.569.
Full textGhourabi, Abdallah, Mahmood A. Mahmood, and Qusay M. Alzubi. "A Hybrid CNN-LSTM Model for SMS Spam Detection in Arabic and English Messages." Future Internet 12, no. 9 (September 18, 2020): 156. http://dx.doi.org/10.3390/fi12090156.
Full textRyu, Gwonsang, Seung-Hyun Kim, and Daeseon Choi. "Implicit Secondary Authentication for Sustainable SMS Authentication." Sustainability 11, no. 1 (January 8, 2019): 279. http://dx.doi.org/10.3390/su11010279.
Full textAli, Guma, Mussa Ally Dida, and Anael Elikana Sam. "Evaluation of Key Security Issues Associated with Mobile Money Systems in Uganda." Information 11, no. 6 (June 8, 2020): 309. http://dx.doi.org/10.3390/info11060309.
Full textLötter, André, and Lynn Futcher. "A framework to assist email users in the identification of phishing attacks." Information & Computer Security 23, no. 4 (October 12, 2015): 370–81. http://dx.doi.org/10.1108/ics-10-2014-0070.
Full textMishra, Sandhya, and Devpriya Soni. "DSmishSMS-A System to Detect Smishing SMS." Neural Computing and Applications, July 28, 2021. http://dx.doi.org/10.1007/s00521-021-06305-y.
Full textMishra, Sandhya, and Devpriya Soni. "A Content-Based Approach for Detecting Smishing in Mobile Environment." SSRN Electronic Journal, 2019. http://dx.doi.org/10.2139/ssrn.3356256.
Full textGhourabi, Abdallah. "SM‐Detector: A security model based on BERT to detect SMiShing messages in mobile environments." Concurrency and Computation: Practice and Experience, June 14, 2021. http://dx.doi.org/10.1002/cpe.6452.
Full text