Littérature scientifique sur le sujet « Smishing »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Smishing ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Smishing":

1

Jain, Ankit Kumar, Sumit Kumar Yadav et Neelam Choudhary. « A Novel Approach to Detect Spam and Smishing SMS using Machine Learning Techniques ». International Journal of E-Services and Mobile Applications 12, no 1 (janvier 2020) : 21–38. http://dx.doi.org/10.4018/ijesma.2020010102.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Résumé :
Smishing attack is generally performed by sending a fake short message service (SMS) that contains a link of the malicious webpage or application. Smishing messages are the subclass of spam SMS and these are more harmful compared to spam messages. There are various solutions available to detect the spam messages. However, no existing solution, filters the smishing message from the spam message. Therefore, this article presents a novel method to filter smishing message from spam message. The proposed approach is divided into two phases. The first phase filters the spam messages and ham messages. The second phase filters smishing messages from spam messages. The performance of the proposed method is evaluated on various machine learning classifiers using the dataset of ham and spam messages. The simulation results indicate that the proposed approach can detect spam messages with the accuracy of 94.9% and it can filter smishing messages with the accuracy of 96% on neural network classifier.
2

Jain, Ankit Kumar, et B. B. Gupta. « Feature Based Approach for Detection of Smishing Messages in the Mobile Environment ». Journal of Information Technology Research 12, no 2 (avril 2019) : 17–35. http://dx.doi.org/10.4018/jitr.2019040102.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Résumé :
Smishing is a security attack that is performed by sending a fake message intending to steal personal credentials of mobile users. Nowadays, smishing attack becomes popular due to the massive growth of mobile users. The smishing message is very harmful since its target to financial benefits. In this article, the authors present a new feature-based approach to detect smishing messages in the mobile environment. This approach offers ten novel features that distinguish the fake messages from the ham messages. In this article, the authors have also identified the nineteen most suspicious keywords, which are used by the attacker to lure victims. This article has implemented these features on benchmarked dataset and applied numerous classification algorithms to judge the performance of the proposed approach. Experimental outcomes indicate that proposed approach can detect smishing messages with the 94.20% true positive rate and 98.74% overall accuracy. Furthermore, the proposed approach is very efficient for the detection of the zero hour attack.
3

Lee, Ji-Won, Dong-Hoon Lee et In-Suk Kim. « Method of Detecting SmiShing using SVM ». Journal of Security Engineering 10, no 6 (31 décembre 2013) : 655–68. http://dx.doi.org/10.14257/jse.2013.12.01.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Mishra, Sandhya, et Devpriya Soni. « Smishing Detector : A security model to detect smishing through SMS content analysis and URL behavior analysis ». Future Generation Computer Systems 108 (juillet 2020) : 803–15. http://dx.doi.org/10.1016/j.future.2020.03.021.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Park, Hyo-Min, Wan-Seok Kim, So-Jeong Kang et Sang Uk Shin. « Cloud Messaging Service for Preventing Smishing Attack ». Journal of Digital Convergence 15, no 4 (28 avril 2017) : 285–93. http://dx.doi.org/10.14400/jdc.2017.15.4.285.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Park, Dea-Woo. « Analysis on Mobile Forensic of Smishing Hacking Attack ». Journal of the Korea Institute of Information and Communication Engineering 18, no 12 (31 décembre 2014) : 2878–84. http://dx.doi.org/10.6109/jkiice.2014.18.12.2878.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

McVey, Tom. « Smishing uses short-lived URLs to avoid detection ». Network Security 2021, no 7 (juillet 2021) : 6. http://dx.doi.org/10.1016/s1353-4858(21)00073-8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Park, Dea-Woo. « Analysis of Mobile Smishing Hacking Trends and Security Measures ». Journal of the Korea Institute of Information and Communication Engineering 19, no 11 (30 novembre 2015) : 2615–22. http://dx.doi.org/10.6109/jkiice.2015.19.11.2615.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Moon, Soon-ho, et Dea-woo Park. « Forensic Analysis of MERS Smishing Hacking Attacks and Prevention ». International Journal of Security and Its Applications 10, no 6 (30 juin 2016) : 181–92. http://dx.doi.org/10.14257/ijsia.2016.10.6.18.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Sonowal, Gunikhan, et K. S. Kuppusamy. « SmiDCA : An Anti-Smishing Model with Machine Learning Approach ». Computer Journal 61, no 8 (25 avril 2018) : 1143–57. http://dx.doi.org/10.1093/comjnl/bxy039.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "Smishing":

1

Metso, Joanna, et Rasmus Gunnarsson. « IT-säkerhetshotet phishing : Svenska små och medelstora företags utbildningsinsatser inom problemområdet ». Thesis, Jönköping University, JTH, Avdelningen för datateknik och informatik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-54185.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Résumé :
Informationssäkerhetsutbildning om phishing krävs för att kunna bekämpa det hot som phishing utgör, då människan alltid är den svagaste länken inom en organisation. Även om förslag och krav kopplade till hur informationssäkerhetsutbildning bör genomföras finns beskrivet i litteratur, standarder och ramverk är det svårt för SMF:er att anpassa och implementera dessa rent praktiskt. Syftet med denna studie är därför att undersöka svenska SMF:ers implementation av utbildningsinsatser för att bemöta phishing-hotet. Empirin har samlats in genom semistrukturerade intervjuer samt tematisk analys. Resultaten från studien visade att utbildningsinsatserna främst är grundade på egna erfarenheter och exempel från tidigare phishing-attacker som drabbat andra organisationer. Ett par organisationer har inte utvecklat sina utbildningsinsatser själva, utan använder verktyg och andra organisationers erfarenheter som hjälpmedel. Resultaten visade också att åsikterna om den valda utbildningsinsatsen inte alltid var lika mellan ledningen och användare. Slutsatsen av studien är att SMF:er kan implementera utbildning kring det hot som phishing utgör utan att förlita sig på specifika ramverk eller standarder, men att organisationen måste vara noga med att anpassa den efter sin egen organisations storlek. För att dra mer långtgående slutsatser än de som beskrivs i rapporten hade det varit av vikt att kunna förlita sig på ett större antal organisationer än de 4 organisationer och 10 intervjudeltagare som deltog i studien. Dessutom behövs mer forskning inom området gällande smishing och vishing.
Information security training about phishing is required to be able to combat the threat that phishing determine, as humans are always the weakest link within an organization. Although proposals and requirements linked to how information security training should be implemented in the literature, standards, and frameworks, it is difficult for SMEs to adapt and implement these in practice. The purpose of this study is therefore to investigate Swedish SMEs' implementation of forms of education to address the phishing threat. The empirical data has been collected through semi-structured interviews and thematic analysis. The results from the study showed that the forms of education are mainly based on own experiences and examples from previous phishing attacks that have affected other organizations. A couple of organizations have not developed their forms of education themselves, instead they use tools and other companies experiences as aids. The results also showed that the opinions about the chosen form of education were not always the same between management and users. The conclusion of the study is that SMEs can implement education around the threat that phishing constitutes without specific frameworks or standards to rely on, but if the organization want to use it, they must be careful to adapt the education to their own organization's size. In order to draw more far-reaching conclusions than those described in the report, it would have been important to be able to rely on a larger number of organizations than the 4 organizations and the 10 interviewees that participated in the study. In addition, more research is needed in the field of smishing and vishing.

Chapitres de livres sur le sujet "Smishing":

1

Goel, Diksha, et Ankit Kumar Jain. « Smishing-Classifier : A Novel Framework for Detection of Smishing Attack in Mobile Environment ». Dans Communications in Computer and Information Science, 502–12. Singapore : Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8660-1_38.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Kang, Anna, Jae Dong Lee, Won Min Kang, Leonard Barolli et Jong Hyuk Park. « Security Considerations for Smart Phone Smishing Attacks ». Dans Lecture Notes in Electrical Engineering, 467–73. Berlin, Heidelberg : Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41674-3_66.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Kang, Anna, Jae Dong Lee, Won Min Kang, Leonard Barolli et Jong Hyuk Park. « Erratum : Security Considerations for Smart Phone Smishing Attacks ». Dans Lecture Notes in Electrical Engineering, E1. Berlin, Heidelberg : Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41674-3_202.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Lee, Ayoung, Kyounghun Kim, Heeman Lee et Moonseog Jun. « A Study on Realtime Detecting Smishing on Cloud Computing Environments ». Dans Lecture Notes in Electrical Engineering, 495–501. Berlin, Heidelberg : Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47895-0_60.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Jain, Ankit Kumar, Sumit Kumar Yadav et Neelam Choudhary. « A Novel Approach to Detect Spam and Smishing SMS using Machine Learning Techniques ». Dans Research Anthology on Securing Mobile Technologies and Applications, 267–85. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8545-0.ch014.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Résumé :
Smishing attack is generally performed by sending a fake short message service (SMS) that contains a link of the malicious webpage or application. Smishing messages are the subclass of spam SMS and these are more harmful compared to spam messages. There are various solutions available to detect the spam messages. However, no existing solution, filters the smishing message from the spam message. Therefore, this article presents a novel method to filter smishing message from spam message. The proposed approach is divided into two phases. The first phase filters the spam messages and ham messages. The second phase filters smishing messages from spam messages. The performance of the proposed method is evaluated on various machine learning classifiers using the dataset of ham and spam messages. The simulation results indicate that the proposed approach can detect spam messages with the accuracy of 94.9% and it can filter smishing messages with the accuracy of 96% on neural network classifier.
6

Jain, Ankit Kumar, et B. B. Gupta. « Feature Based Approach for Detection of Smishing Messages in the Mobile Environment ». Dans Research Anthology on Securing Mobile Technologies and Applications, 286–306. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8545-0.ch015.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Résumé :
Smishing is a security attack that is performed by sending a fake message intending to steal personal credentials of mobile users. Nowadays, smishing attack becomes popular due to the massive growth of mobile users. The smishing message is very harmful since its target to financial benefits. In this article, the authors present a new feature-based approach to detect smishing messages in the mobile environment. This approach offers ten novel features that distinguish the fake messages from the ham messages. In this article, the authors have also identified the nineteen most suspicious keywords, which are used by the attacker to lure victims. This article has implemented these features on benchmarked dataset and applied numerous classification algorithms to judge the performance of the proposed approach. Experimental outcomes indicate that proposed approach can detect smishing messages with the 94.20% true positive rate and 98.74% overall accuracy. Furthermore, the proposed approach is very efficient for the detection of the zero hour attack.
7

« Phishing, SMishing, and Vishing ». Dans Mobile Malware Attacks and Defense, 125–96. Elsevier, 2009. http://dx.doi.org/10.1016/b978-1-59749-298-0.00006-9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Smishing":

1

Boukari, Badr Eddine, Akshaya Ravi et Mounira Msahli. « Machine Learning Detection for SMiShing Frauds ». Dans 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC). IEEE, 2021. http://dx.doi.org/10.1109/ccnc49032.2021.9369640.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Balim, Caner, et Efnan Sora Gunal. « Automatic Detection of Smishing Attacks by Machine Learning Methods ». Dans 2019 1st International Informatics and Software Engineering Conference (UBMYK). IEEE, 2019. http://dx.doi.org/10.1109/ubmyk48245.2019.8965429.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Vers la bibliographie