Добірка наукової літератури з теми "Smishing"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Smishing".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Smishing":
Jain, Ankit Kumar, Sumit Kumar Yadav, and Neelam Choudhary. "A Novel Approach to Detect Spam and Smishing SMS using Machine Learning Techniques." International Journal of E-Services and Mobile Applications 12, no. 1 (January 2020): 21–38. http://dx.doi.org/10.4018/ijesma.2020010102.
Jain, Ankit Kumar, and B. B. Gupta. "Feature Based Approach for Detection of Smishing Messages in the Mobile Environment." Journal of Information Technology Research 12, no. 2 (April 2019): 17–35. http://dx.doi.org/10.4018/jitr.2019040102.
Lee, Ji-Won, Dong-Hoon Lee, and In-Suk Kim. "Method of Detecting SmiShing using SVM." Journal of Security Engineering 10, no. 6 (December 31, 2013): 655–68. http://dx.doi.org/10.14257/jse.2013.12.01.
Mishra, Sandhya, and Devpriya Soni. "Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis." Future Generation Computer Systems 108 (July 2020): 803–15. http://dx.doi.org/10.1016/j.future.2020.03.021.
Park, Hyo-Min, Wan-Seok Kim, So-Jeong Kang, and Sang Uk Shin. "Cloud Messaging Service for Preventing Smishing Attack." Journal of Digital Convergence 15, no. 4 (April 28, 2017): 285–93. http://dx.doi.org/10.14400/jdc.2017.15.4.285.
Park, Dea-Woo. "Analysis on Mobile Forensic of Smishing Hacking Attack." Journal of the Korea Institute of Information and Communication Engineering 18, no. 12 (December 31, 2014): 2878–84. http://dx.doi.org/10.6109/jkiice.2014.18.12.2878.
McVey, Tom. "Smishing uses short-lived URLs to avoid detection." Network Security 2021, no. 7 (July 2021): 6. http://dx.doi.org/10.1016/s1353-4858(21)00073-8.
Park, Dea-Woo. "Analysis of Mobile Smishing Hacking Trends and Security Measures." Journal of the Korea Institute of Information and Communication Engineering 19, no. 11 (November 30, 2015): 2615–22. http://dx.doi.org/10.6109/jkiice.2015.19.11.2615.
Moon, Soon-ho, and Dea-woo Park. "Forensic Analysis of MERS Smishing Hacking Attacks and Prevention." International Journal of Security and Its Applications 10, no. 6 (June 30, 2016): 181–92. http://dx.doi.org/10.14257/ijsia.2016.10.6.18.
Sonowal, Gunikhan, and K. S. Kuppusamy. "SmiDCA: An Anti-Smishing Model with Machine Learning Approach." Computer Journal 61, no. 8 (April 25, 2018): 1143–57. http://dx.doi.org/10.1093/comjnl/bxy039.
Дисертації з теми "Smishing":
Metso, Joanna, and Rasmus Gunnarsson. "IT-säkerhetshotet phishing : Svenska små och medelstora företags utbildningsinsatser inom problemområdet." Thesis, Jönköping University, JTH, Avdelningen för datateknik och informatik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-54185.
Information security training about phishing is required to be able to combat the threat that phishing determine, as humans are always the weakest link within an organization. Although proposals and requirements linked to how information security training should be implemented in the literature, standards, and frameworks, it is difficult for SMEs to adapt and implement these in practice. The purpose of this study is therefore to investigate Swedish SMEs' implementation of forms of education to address the phishing threat. The empirical data has been collected through semi-structured interviews and thematic analysis. The results from the study showed that the forms of education are mainly based on own experiences and examples from previous phishing attacks that have affected other organizations. A couple of organizations have not developed their forms of education themselves, instead they use tools and other companies experiences as aids. The results also showed that the opinions about the chosen form of education were not always the same between management and users. The conclusion of the study is that SMEs can implement education around the threat that phishing constitutes without specific frameworks or standards to rely on, but if the organization want to use it, they must be careful to adapt the education to their own organization's size. In order to draw more far-reaching conclusions than those described in the report, it would have been important to be able to rely on a larger number of organizations than the 4 organizations and the 10 interviewees that participated in the study. In addition, more research is needed in the field of smishing and vishing.
Частини книг з теми "Smishing":
Goel, Diksha, and Ankit Kumar Jain. "Smishing-Classifier: A Novel Framework for Detection of Smishing Attack in Mobile Environment." In Communications in Computer and Information Science, 502–12. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8660-1_38.
Kang, Anna, Jae Dong Lee, Won Min Kang, Leonard Barolli, and Jong Hyuk Park. "Security Considerations for Smart Phone Smishing Attacks." In Lecture Notes in Electrical Engineering, 467–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41674-3_66.
Kang, Anna, Jae Dong Lee, Won Min Kang, Leonard Barolli, and Jong Hyuk Park. "Erratum: Security Considerations for Smart Phone Smishing Attacks." In Lecture Notes in Electrical Engineering, E1. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41674-3_202.
Lee, Ayoung, Kyounghun Kim, Heeman Lee, and Moonseog Jun. "A Study on Realtime Detecting Smishing on Cloud Computing Environments." In Lecture Notes in Electrical Engineering, 495–501. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47895-0_60.
Jain, Ankit Kumar, Sumit Kumar Yadav, and Neelam Choudhary. "A Novel Approach to Detect Spam and Smishing SMS using Machine Learning Techniques." In Research Anthology on Securing Mobile Technologies and Applications, 267–85. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8545-0.ch014.
Jain, Ankit Kumar, and B. B. Gupta. "Feature Based Approach for Detection of Smishing Messages in the Mobile Environment." In Research Anthology on Securing Mobile Technologies and Applications, 286–306. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8545-0.ch015.
"Phishing, SMishing, and Vishing." In Mobile Malware Attacks and Defense, 125–96. Elsevier, 2009. http://dx.doi.org/10.1016/b978-1-59749-298-0.00006-9.
Тези доповідей конференцій з теми "Smishing":
Boukari, Badr Eddine, Akshaya Ravi, and Mounira Msahli. "Machine Learning Detection for SMiShing Frauds." In 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC). IEEE, 2021. http://dx.doi.org/10.1109/ccnc49032.2021.9369640.
Balim, Caner, and Efnan Sora Gunal. "Automatic Detection of Smishing Attacks by Machine Learning Methods." In 2019 1st International Informatics and Software Engineering Conference (UBMYK). IEEE, 2019. http://dx.doi.org/10.1109/ubmyk48245.2019.8965429.