Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Smishing.

Zeitschriftenartikel zum Thema „Smishing“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-28 Zeitschriftenartikel für die Forschung zum Thema "Smishing" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Jain, Ankit Kumar, Sumit Kumar Yadav und Neelam Choudhary. „A Novel Approach to Detect Spam and Smishing SMS using Machine Learning Techniques“. International Journal of E-Services and Mobile Applications 12, Nr. 1 (Januar 2020): 21–38. http://dx.doi.org/10.4018/ijesma.2020010102.

Der volle Inhalt der Quelle
Annotation:
Smishing attack is generally performed by sending a fake short message service (SMS) that contains a link of the malicious webpage or application. Smishing messages are the subclass of spam SMS and these are more harmful compared to spam messages. There are various solutions available to detect the spam messages. However, no existing solution, filters the smishing message from the spam message. Therefore, this article presents a novel method to filter smishing message from spam message. The proposed approach is divided into two phases. The first phase filters the spam messages and ham messages. The second phase filters smishing messages from spam messages. The performance of the proposed method is evaluated on various machine learning classifiers using the dataset of ham and spam messages. The simulation results indicate that the proposed approach can detect spam messages with the accuracy of 94.9% and it can filter smishing messages with the accuracy of 96% on neural network classifier.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Jain, Ankit Kumar, und B. B. Gupta. „Feature Based Approach for Detection of Smishing Messages in the Mobile Environment“. Journal of Information Technology Research 12, Nr. 2 (April 2019): 17–35. http://dx.doi.org/10.4018/jitr.2019040102.

Der volle Inhalt der Quelle
Annotation:
Smishing is a security attack that is performed by sending a fake message intending to steal personal credentials of mobile users. Nowadays, smishing attack becomes popular due to the massive growth of mobile users. The smishing message is very harmful since its target to financial benefits. In this article, the authors present a new feature-based approach to detect smishing messages in the mobile environment. This approach offers ten novel features that distinguish the fake messages from the ham messages. In this article, the authors have also identified the nineteen most suspicious keywords, which are used by the attacker to lure victims. This article has implemented these features on benchmarked dataset and applied numerous classification algorithms to judge the performance of the proposed approach. Experimental outcomes indicate that proposed approach can detect smishing messages with the 94.20% true positive rate and 98.74% overall accuracy. Furthermore, the proposed approach is very efficient for the detection of the zero hour attack.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Lee, Ji-Won, Dong-Hoon Lee und In-Suk Kim. „Method of Detecting SmiShing using SVM“. Journal of Security Engineering 10, Nr. 6 (31.12.2013): 655–68. http://dx.doi.org/10.14257/jse.2013.12.01.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Mishra, Sandhya, und Devpriya Soni. „Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis“. Future Generation Computer Systems 108 (Juli 2020): 803–15. http://dx.doi.org/10.1016/j.future.2020.03.021.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Park, Hyo-Min, Wan-Seok Kim, So-Jeong Kang und Sang Uk Shin. „Cloud Messaging Service for Preventing Smishing Attack“. Journal of Digital Convergence 15, Nr. 4 (28.04.2017): 285–93. http://dx.doi.org/10.14400/jdc.2017.15.4.285.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Park, Dea-Woo. „Analysis on Mobile Forensic of Smishing Hacking Attack“. Journal of the Korea Institute of Information and Communication Engineering 18, Nr. 12 (31.12.2014): 2878–84. http://dx.doi.org/10.6109/jkiice.2014.18.12.2878.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

McVey, Tom. „Smishing uses short-lived URLs to avoid detection“. Network Security 2021, Nr. 7 (Juli 2021): 6. http://dx.doi.org/10.1016/s1353-4858(21)00073-8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Park, Dea-Woo. „Analysis of Mobile Smishing Hacking Trends and Security Measures“. Journal of the Korea Institute of Information and Communication Engineering 19, Nr. 11 (30.11.2015): 2615–22. http://dx.doi.org/10.6109/jkiice.2015.19.11.2615.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Moon, Soon-ho, und Dea-woo Park. „Forensic Analysis of MERS Smishing Hacking Attacks and Prevention“. International Journal of Security and Its Applications 10, Nr. 6 (30.06.2016): 181–92. http://dx.doi.org/10.14257/ijsia.2016.10.6.18.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Sonowal, Gunikhan, und K. S. Kuppusamy. „SmiDCA: An Anti-Smishing Model with Machine Learning Approach“. Computer Journal 61, Nr. 8 (25.04.2018): 1143–57. http://dx.doi.org/10.1093/comjnl/bxy039.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Lee, Si-Young, Hee-Soo Kang und Jong-Sub Moon. „A Study on Smishing Block of Android Platform Environment“. Journal of the Korea Institute of Information Security and Cryptology 24, Nr. 5 (31.10.2014): 975–85. http://dx.doi.org/10.13089/jkiisc.2014.24.5.975.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Park, In-Woo, und Dea-Woo Park. „A Study of Intrusion Security Research and Smishing Hacking Attack on a Smartphone“. Journal of the Korea Institute of Information and Communication Engineering 17, Nr. 11 (30.11.2013): 2588–94. http://dx.doi.org/10.6109/jkiice.2013.17.11.2588.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Kim, Do-Young, und Sung-Mok Cho. „A Proposal of Smart Phone App for Preventing Smishing Attack“. Journal of Security Engineering 12, Nr. 3 (30.06.2015): 207–20. http://dx.doi.org/10.14257/jse.2015.06.08.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Ustundag Soykan, Elif, und Mustafa Bagriyanik. „The Effect of SMiShing Attack on Security of Demand Response Programs“. Energies 13, Nr. 17 (02.09.2020): 4542. http://dx.doi.org/10.3390/en13174542.

Der volle Inhalt der Quelle
Annotation:
Demand response (DR) is a vital element for a reliable and sustainable power grid. Consumer behavior is a key factor in the success of DR programs. In this study, we focus on how consumer reaction to Short Messaging Service (SMS) messages can disturb the demand response. We present a new type of threat to DR programs using SMS phishing attacks. We follow a holistic approach starting from a risk assessment focusing on DR programs’ notification message security following the Smart Grid Information Security (SGIS) risk methodology. We identify threats, conduct impact analysis, and estimate the likelihood of the attacks for various attacker types and motivations. We implemented deterministic and randomized attack scenarios to demonstrate the success of the attack using a state-of-the-art simulator on the IEEE European Low Voltage Feeder Test System. Simulations show that the attack results in local outages, which may lead to large-scale blackouts with the cascading effect on the power system. We conclude that this is a new type of threat that has been overlooked, and it deserves more attention as mobile devices will continually be part of our lives.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Jain, Ankit Kumar, und B. B. Gupta. „Rule-Based Framework for Detection of Smishing Messages in Mobile Environment“. Procedia Computer Science 125 (2018): 617–23. http://dx.doi.org/10.1016/j.procs.2017.12.079.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Choi, Hark-Kyu, und Hwang-Rae Kim. „Design and Implementation of a Malicious SMS Training System for Preventing Smishing“. Journal of Korean Institute of Information Technology 17, Nr. 10 (31.10.2019): 93–99. http://dx.doi.org/10.14801/jkiit.2019.17.10.93.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Joo, Jae Woong, Seo Yeon Moon, Saurabh Singh und Jong Hyuk Park. „S-Detector: an enhanced security model for detecting Smishing attack for mobile computing“. Telecommunication Systems 66, Nr. 1 (11.01.2017): 29–38. http://dx.doi.org/10.1007/s11235-016-0269-9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Kang, Ji Won, Ae Ri Lee und Beomsoo Kim. „Improving Security Awareness about Smishing through Experiment on the Optimistic Bias on Risk Perception“. Journal of the Korea Institute of Information Security and Cryptology 26, Nr. 2 (30.04.2016): 475–87. http://dx.doi.org/10.13089/jkiisc.2016.26.2.475.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Joo, Choon Kyong, und Ji Won Yoon. „Discrimination of SPAM and prevention of smishing by sending personally identified SMS(For financial sector)“. Journal of the Korea Institute of Information Security and Cryptology 24, Nr. 4 (31.08.2014): 645–53. http://dx.doi.org/10.13089/jkiisc.2014.24.4.645.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Ojugo, Arnold Adimabua, und Andrew Okonji Eboka. „Memetic algorithm for short messaging service spam filter using text normalization and semantic approach“. International Journal of Informatics and Communication Technology (IJ-ICT) 9, Nr. 1 (01.04.2020): 9. http://dx.doi.org/10.11591/ijict.v9i1.pp9-18.

Der volle Inhalt der Quelle
Annotation:
Today’s popularity of the short messages services (SMS) has created a propitious environment for spamming to thrive. Spams are unsolicited advertising, adult-themed or inappropriate content, premium fraud, smishing and malware. They are a constant reminder of the need for an effective spam filter. However, SMS limitations of 160-charcaters and 140-bytes size as well as its being rippled with slangs, emoticons and abbreviations further inhibits effective training of models to aid accurate classification. The study proposes Genetic Algorithm Trained Bayesian Network solution that seeks to normalize noisy feats, expand text via use of lexicographic and semantic dictionaries that uses word sense disambiguation technique to train the underlying learning heuristics. And in turn, effectively help to classify SMS in spam and legitimate classes. Hybrid model comprises of text preprocessing, feature selection as well as training and classification section. Study uses a hybrid Genetic Algorithm trained Bayesian model for which the GA is used for feature selection; while, the Bayesian algorithm is used as classifier.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Seo, Gil-Won, und Il-Young Moon. „A Study of Technical Countermeasure System for the Smishing Detection and Prevention Based on the Android Platform“. Journal of Korea Navigation Institute 18, Nr. 6 (30.12.2014): 569–75. http://dx.doi.org/10.12673/jant.2014.18.6.569.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Ghourabi, Abdallah, Mahmood A. Mahmood und Qusay M. Alzubi. „A Hybrid CNN-LSTM Model for SMS Spam Detection in Arabic and English Messages“. Future Internet 12, Nr. 9 (18.09.2020): 156. http://dx.doi.org/10.3390/fi12090156.

Der volle Inhalt der Quelle
Annotation:
Despite the rapid evolution of Internet protocol-based messaging services, SMS still remains an indisputable communication service in our lives until today. For example, several businesses consider that text messages are more effective than e-mails. This is because 82% of SMSs are read within 5 min., but consumers only open one in four e-mails they receive. The importance of SMS for mobile phone users has attracted the attention of spammers. In fact, the volume of SMS spam has increased considerably in recent years with the emergence of new security threats, such as SMiShing. In this paper, we propose a hybrid deep learning model for detecting SMS spam messages. This detection model is based on the combination of two deep learning methods CNN and LSTM. It is intended to deal with mixed text messages that are written in Arabic or English. For the comparative evaluation, we also tested other well-known machine learning algorithms. The experimental results that we present in this paper show that our CNN-LSTM model outperforms the other algorithms. It achieved a very good accuracy of 98.37%.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Ryu, Gwonsang, Seung-Hyun Kim und Daeseon Choi. „Implicit Secondary Authentication for Sustainable SMS Authentication“. Sustainability 11, Nr. 1 (08.01.2019): 279. http://dx.doi.org/10.3390/su11010279.

Der volle Inhalt der Quelle
Annotation:
Short message service (SMS) is the most widely adopted multi-factor authentication method for consumer-facing accounts. However, SMS authentication is susceptible to vulnerabilities such as man-in-the-middle attack, smishing, and device theft. This study proposes implicit authentication based on behavioral pattern of users when they check an SMS verification code and environmental information of user proximity to detect device theft. User behavioral pattern is collected by using the accelerometer and gyroscope of a smart device such as a smartphone and smart watch. User environmental information is collected using device fingerprint, wireless access point, Bluetooth, and global positioning system information. To evaluate the performance of the proposed scheme, we perform experiments using a total of 1320 behavioral and environmental data collected from 22 participants. The scheme achieves an average equal error rate of 6.27% when using both behavioral and environmental data collected from only a smartphone. Moreover, it achieves an average equal error rate of 0% when using both behavioral and environmental data collected from a smartphone and smart watch. Therefore, the proposed scheme can be employed for more secure SMS authentication.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Ali, Guma, Mussa Ally Dida und Anael Elikana Sam. „Evaluation of Key Security Issues Associated with Mobile Money Systems in Uganda“. Information 11, Nr. 6 (08.06.2020): 309. http://dx.doi.org/10.3390/info11060309.

Der volle Inhalt der Quelle
Annotation:
Smartphone technology has improved access to mobile money services (MMS) and successful mobile money deployment has brought massive benefits to the unbanked population in both rural and urban areas of Uganda. Despite its enormous benefits, embracing the usage and acceptance of mobile money has mostly been low due to security issues and challenges associated with the system. As a result, there is a need to carry out a survey to evaluate the key security issues associated with mobile money systems in Uganda. The study employed a descriptive research design, and stratified random sampling technique to group the population. Krejcie and Morgan’s formula was used to determine the sample size for the study. The collection of data was through the administration of structured questionnaires, where 741 were filled by registered mobile money (MM) users, 447 registered MM agents, and 52 mobile network operators’ (MNOs) IT officers of the mobile money service providers (MMSPs) in Uganda. The collected data were analyzed using RStudio software. Statistical techniques like descriptive analysis and Pearson Chi-Square test was used in data analysis and mean (M) > 3.0 and p-value < 0.05 were considered statistically significant. The findings revealed that the key security issues are identity theft, authentication attack, phishing attack, vishing attack, SMiShing attack, personal identification number (PIN) sharing, and agent-driven fraud. Based on these findings, the use of better access controls, customer awareness campaigns, agent training on acceptable practices, strict measures against fraudsters, high-value transaction monitoring by the service providers, developing a comprehensive legal document to run mobile money service, were some of the proposed mitigation measures. This study, therefore, provides a baseline survey to help MNO and the government that would wish to implement secure mobile money systems.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Lötter, André, und Lynn Futcher. „A framework to assist email users in the identification of phishing attacks“. Information & Computer Security 23, Nr. 4 (12.10.2015): 370–81. http://dx.doi.org/10.1108/ics-10-2014-0070.

Der volle Inhalt der Quelle
Annotation:
Purpose – The purpose of this paper is to propose a framework to address the problem that email users are not well-informed or assisted by their email clients in identifying possible phishing attacks, thereby putting their personal information at risk. This paper therefore addresses the human weakness (i.e. the user’s lack of knowledge of phishing attacks which causes them to fall victim to such attacks) as well as the software related issue of email clients not visually assisting and guiding the users through the user interface. Design/methodology/approach – A literature study was conducted in the main field of information security with a specific focus on understanding phishing attacks and a modelling technique was used to represent the proposed framework. This paper argues that the framework can be suitably implemented for email clients to raise awareness about phishing attacks. To validate the framework as a plausible mechanism, it was reviewed by a focus group within the School of Information and Communication Technology (ICT) at the Nelson Mandela Metropolitan University (NMMU). The focus group consisted of academics and research students in the field of information security. Findings – This paper argues that email clients should make use of feedback mechanisms to present security related aspects to their users, so as to make them aware of the characteristics pertaining to phishing attacks. To support this argument, it presents a framework to assist email users in the identification of phishing attacks. Research limitations/implications – Future research would yield interesting results if the proposed framework were implemented into an existing email client to determine the effect of the framework on the user’s level of awareness of phishing attacks. Furthermore, the list of characteristics could be expanded to include all phishing types (such as clone phishing, smishing, vishing and pharming). This would make the framework more dynamic in that it could then address all forms of phishing attacks. Practical implications – The proposed framework could enable email clients to provide assistance through the user interface. Visibly relaying the security level to the users of the email client, and providing short descriptions as to why a certain email is considered suspicious, could result in raising the awareness of the average email user with regard to phishing attacks. Originality/value – This research presents a framework that email clients can use to identify common forms of normal and spear phishing attacks. The proposed framework addresses the problem that the average Internet user lacks a baseline level of online security awareness. It argues that the email client is the ideal place to raise the awareness of users regarding phishing attacks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Mishra, Sandhya, und Devpriya Soni. „DSmishSMS-A System to Detect Smishing SMS“. Neural Computing and Applications, 28.07.2021. http://dx.doi.org/10.1007/s00521-021-06305-y.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Mishra, Sandhya, und Devpriya Soni. „A Content-Based Approach for Detecting Smishing in Mobile Environment“. SSRN Electronic Journal, 2019. http://dx.doi.org/10.2139/ssrn.3356256.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Ghourabi, Abdallah. „SM‐Detector: A security model based on BERT to detect SMiShing messages in mobile environments“. Concurrency and Computation: Practice and Experience, 14.06.2021. http://dx.doi.org/10.1002/cpe.6452.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie