Статті в журналах з теми "Smishing"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-28 статей у журналах для дослідження на тему "Smishing".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Jain, Ankit Kumar, Sumit Kumar Yadav, and Neelam Choudhary. "A Novel Approach to Detect Spam and Smishing SMS using Machine Learning Techniques." International Journal of E-Services and Mobile Applications 12, no. 1 (January 2020): 21–38. http://dx.doi.org/10.4018/ijesma.2020010102.
Jain, Ankit Kumar, and B. B. Gupta. "Feature Based Approach for Detection of Smishing Messages in the Mobile Environment." Journal of Information Technology Research 12, no. 2 (April 2019): 17–35. http://dx.doi.org/10.4018/jitr.2019040102.
Lee, Ji-Won, Dong-Hoon Lee, and In-Suk Kim. "Method of Detecting SmiShing using SVM." Journal of Security Engineering 10, no. 6 (December 31, 2013): 655–68. http://dx.doi.org/10.14257/jse.2013.12.01.
Mishra, Sandhya, and Devpriya Soni. "Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis." Future Generation Computer Systems 108 (July 2020): 803–15. http://dx.doi.org/10.1016/j.future.2020.03.021.
Park, Hyo-Min, Wan-Seok Kim, So-Jeong Kang, and Sang Uk Shin. "Cloud Messaging Service for Preventing Smishing Attack." Journal of Digital Convergence 15, no. 4 (April 28, 2017): 285–93. http://dx.doi.org/10.14400/jdc.2017.15.4.285.
Park, Dea-Woo. "Analysis on Mobile Forensic of Smishing Hacking Attack." Journal of the Korea Institute of Information and Communication Engineering 18, no. 12 (December 31, 2014): 2878–84. http://dx.doi.org/10.6109/jkiice.2014.18.12.2878.
McVey, Tom. "Smishing uses short-lived URLs to avoid detection." Network Security 2021, no. 7 (July 2021): 6. http://dx.doi.org/10.1016/s1353-4858(21)00073-8.
Park, Dea-Woo. "Analysis of Mobile Smishing Hacking Trends and Security Measures." Journal of the Korea Institute of Information and Communication Engineering 19, no. 11 (November 30, 2015): 2615–22. http://dx.doi.org/10.6109/jkiice.2015.19.11.2615.
Moon, Soon-ho, and Dea-woo Park. "Forensic Analysis of MERS Smishing Hacking Attacks and Prevention." International Journal of Security and Its Applications 10, no. 6 (June 30, 2016): 181–92. http://dx.doi.org/10.14257/ijsia.2016.10.6.18.
Sonowal, Gunikhan, and K. S. Kuppusamy. "SmiDCA: An Anti-Smishing Model with Machine Learning Approach." Computer Journal 61, no. 8 (April 25, 2018): 1143–57. http://dx.doi.org/10.1093/comjnl/bxy039.
Lee, Si-Young, Hee-Soo Kang, and Jong-Sub Moon. "A Study on Smishing Block of Android Platform Environment." Journal of the Korea Institute of Information Security and Cryptology 24, no. 5 (October 31, 2014): 975–85. http://dx.doi.org/10.13089/jkiisc.2014.24.5.975.
Park, In-Woo, and Dea-Woo Park. "A Study of Intrusion Security Research and Smishing Hacking Attack on a Smartphone." Journal of the Korea Institute of Information and Communication Engineering 17, no. 11 (November 30, 2013): 2588–94. http://dx.doi.org/10.6109/jkiice.2013.17.11.2588.
Kim, Do-Young, and Sung-Mok Cho. "A Proposal of Smart Phone App for Preventing Smishing Attack." Journal of Security Engineering 12, no. 3 (June 30, 2015): 207–20. http://dx.doi.org/10.14257/jse.2015.06.08.
Ustundag Soykan, Elif, and Mustafa Bagriyanik. "The Effect of SMiShing Attack on Security of Demand Response Programs." Energies 13, no. 17 (September 2, 2020): 4542. http://dx.doi.org/10.3390/en13174542.
Jain, Ankit Kumar, and B. B. Gupta. "Rule-Based Framework for Detection of Smishing Messages in Mobile Environment." Procedia Computer Science 125 (2018): 617–23. http://dx.doi.org/10.1016/j.procs.2017.12.079.
Choi, Hark-Kyu, and Hwang-Rae Kim. "Design and Implementation of a Malicious SMS Training System for Preventing Smishing." Journal of Korean Institute of Information Technology 17, no. 10 (October 31, 2019): 93–99. http://dx.doi.org/10.14801/jkiit.2019.17.10.93.
Joo, Jae Woong, Seo Yeon Moon, Saurabh Singh, and Jong Hyuk Park. "S-Detector: an enhanced security model for detecting Smishing attack for mobile computing." Telecommunication Systems 66, no. 1 (January 11, 2017): 29–38. http://dx.doi.org/10.1007/s11235-016-0269-9.
Kang, Ji Won, Ae Ri Lee, and Beomsoo Kim. "Improving Security Awareness about Smishing through Experiment on the Optimistic Bias on Risk Perception." Journal of the Korea Institute of Information Security and Cryptology 26, no. 2 (April 30, 2016): 475–87. http://dx.doi.org/10.13089/jkiisc.2016.26.2.475.
Joo, Choon Kyong, and Ji Won Yoon. "Discrimination of SPAM and prevention of smishing by sending personally identified SMS(For financial sector)." Journal of the Korea Institute of Information Security and Cryptology 24, no. 4 (August 31, 2014): 645–53. http://dx.doi.org/10.13089/jkiisc.2014.24.4.645.
Ojugo, Arnold Adimabua, and Andrew Okonji Eboka. "Memetic algorithm for short messaging service spam filter using text normalization and semantic approach." International Journal of Informatics and Communication Technology (IJ-ICT) 9, no. 1 (April 1, 2020): 9. http://dx.doi.org/10.11591/ijict.v9i1.pp9-18.
Seo, Gil-Won, and Il-Young Moon. "A Study of Technical Countermeasure System for the Smishing Detection and Prevention Based on the Android Platform." Journal of Korea Navigation Institute 18, no. 6 (December 30, 2014): 569–75. http://dx.doi.org/10.12673/jant.2014.18.6.569.
Ghourabi, Abdallah, Mahmood A. Mahmood, and Qusay M. Alzubi. "A Hybrid CNN-LSTM Model for SMS Spam Detection in Arabic and English Messages." Future Internet 12, no. 9 (September 18, 2020): 156. http://dx.doi.org/10.3390/fi12090156.
Ryu, Gwonsang, Seung-Hyun Kim, and Daeseon Choi. "Implicit Secondary Authentication for Sustainable SMS Authentication." Sustainability 11, no. 1 (January 8, 2019): 279. http://dx.doi.org/10.3390/su11010279.
Ali, Guma, Mussa Ally Dida, and Anael Elikana Sam. "Evaluation of Key Security Issues Associated with Mobile Money Systems in Uganda." Information 11, no. 6 (June 8, 2020): 309. http://dx.doi.org/10.3390/info11060309.
Lötter, André, and Lynn Futcher. "A framework to assist email users in the identification of phishing attacks." Information & Computer Security 23, no. 4 (October 12, 2015): 370–81. http://dx.doi.org/10.1108/ics-10-2014-0070.
Mishra, Sandhya, and Devpriya Soni. "DSmishSMS-A System to Detect Smishing SMS." Neural Computing and Applications, July 28, 2021. http://dx.doi.org/10.1007/s00521-021-06305-y.
Mishra, Sandhya, and Devpriya Soni. "A Content-Based Approach for Detecting Smishing in Mobile Environment." SSRN Electronic Journal, 2019. http://dx.doi.org/10.2139/ssrn.3356256.
Ghourabi, Abdallah. "SM‐Detector: A security model based on BERT to detect SMiShing messages in mobile environments." Concurrency and Computation: Practice and Experience, June 14, 2021. http://dx.doi.org/10.1002/cpe.6452.