"Mobile Phishing Attacks and Mitigation Techniques"
written by Hossain Shahriar, Tulin Klintic, Victor Clincy,
published by Journal of Information Security, Vol.6 No.3, 2015
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Human Factors in Cybersecurity: Issues and Challenges in Big Data
2020
[2] Do not jail my app: Detecting the Android plugin environments by time lag contradiction
2020
[3] Smishing detector: A security model to detect smishing through SMS content analysis and url behavior analysis
2020
[4] Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures
2020
[5] A Cost-Effective OCR Implementation to Prevent Phishing on Mobile Platforms
2020
[6] Characterizing Emerging Cybersecurity Threats: An Ecosystem Approach
2020
[7] Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
2019 IEEE Symposium on Security and Privacy (SP), 2019
[8] SMS Phishing and Mitigation Approaches
2019
[9] Mobile anti-phishing: Approaches and challenges
2019
[10] SuiT: Secure User Interface Based on TrustZone
2019
[11] A Study on the Use of Mobile-specific HTML5 WebAPI Calls on the Web
2019
[12] SMARTPHONE TRIGGERED SECURITY CHALLENGES-ISSUES, CASE STUDIES AND PREVENTION
2019
[13] A Content-Based Approach for Detecting Smishing in Mobile Environment
2019
[14] Mobile Phishing Websites Detection and Prevention Using Data Mining Techniques.
2019
[15] A Case-Based Reasoning Approach for Automatic Adaptation of Classifiers in Mobile Phishing Detection
2019
[16] Mobile Phishing Websites Detection and Prevention Using Data Mining Techniques
2019
[17] Non-invasive Privilege Escalation through Mobile and IoT System Interface: Threats and Mitigation
ProQuest Dissertations Publishing, 2018
[18] SmiDCA: An Anti-Smishing Model with Machine Learning Approach
The Computer Journal, 2018
[19] Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home
2018
[20] A survey about attack and defence phishing techniques
2018
[21] SNS Use, Risk, and Executive Behavior
2018
[22] Revealing the important features of mobile phishing
2018
[23] A Mobile-Based Phishing Detector App for E-Mails
2017
[24] Phishing Campaigns in Corporate Water
2017
[25] Cloud Messaging Service for Preventing Smishing Attack
2017
[26] A Mobile-Based Phishing Detector App for E-Mails.
Computing & Information Systems, 2017
[27] Unleashing the walking dead: Understanding cross-app remote infections on mobile webviews
CCS 2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
[28] Comparative analysis of mobile phishing detection and prevention approaches
Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1, 2017
[29] Mobile Phishing Detection using Naive Bayesian Algorithm
2017
[30] UnPhishMe: Phishing Attack Detection by Deceptive Login Simulation through an Android Mobile App
2017
[31] Analizando el nivel de seguridad del entorno de Android
2016
[32] Designing secure web and mobile-based information system for dissemination of students' examination results: the suitability of soft design science …
International Journal of Computing and ICT Research, 2016
[33] Phishing detection based on newly registered domains
2016
[34] CELLPOTS SEBAGAI ANTI-PHISING ATTACK PADA MOBILE CELLULAR NETWORK
2016
[35] MP-Shield: A Framework for Phishing Detection in Mobile Devices
Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on, 2015