[1]
|
DSmishSMS-A System to Detect Smishing SMS
Neural Computing and Applications,
2023
DOI:10.1007/s00521-021-06305-y
|
|
|
[2]
|
Phishing URL Detection Using Machine Learning: A Survey
2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N),
2022
DOI:10.1109/ICAC3N56670.2022.10074337
|
|
|
[3]
|
Cybersecurity and Cognitive Science
2022
DOI:10.1016/B978-0-323-90570-1.00001-2
|
|
|
[4]
|
The Emperor’s New Autofill Framework:A Security Analysis of Autofill on iOS and Android
Annual Computer Security Applications Conference,
2021
DOI:10.1145/3485832.3485884
|
|
|
[5]
|
Research Anthology on Privatizing and Securing Data
2021
DOI:10.4018/978-1-7998-8954-0.ch082
|
|
|
[6]
|
DSmishSMS-A System to Detect Smishing SMS
Neural Computing and Applications,
2021
DOI:10.1007/s00521-021-06305-y
|
|
|
[7]
|
The Emperor’s New Autofill Framework:A Security Analysis of Autofill on iOS and Android
Annual Computer Security Applications Conference,
2021
DOI:10.1145/3485832.3485884
|
|
|
[8]
|
Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures
Future Internet,
2020
DOI:10.3390/fi12100160
|
|
|
[9]
|
A Study on the Digital Forensic Investigation Method of Clever Malware in IoT Devices
IEEE Access,
2020
DOI:10.1109/ACCESS.2020.3043939
|
|
|
[10]
|
A PARALLEL AVERAGED NEURAL NETWORK APPROACH FOR DETECTING SMARTPHONE PHISHES
JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES,
2020
DOI:10.26782/jmcms.2020.06.00008
|
|
|
[11]
|
Security, Privacy, and Forensics Issues in Big Data
Advances in Information Security, Privacy, and Ethics,
2020
DOI:10.4018/978-1-5225-9742-1.ch003
|
|
|
[12]
|
Do not jail my app: Detecting the Android plugin environments by time lag contradiction
Journal of Computer Security,
2020
DOI:10.3233/JCS-191325
|
|
|
[13]
|
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
2019 IEEE Symposium on Security and Privacy (SP),
2019
DOI:10.1109/SP.2019.00016
|
|
|
[14]
|
SMS Phishing and Mitigation Approaches
2019 Twelfth International Conference on Contemporary Computing (IC3),
2019
DOI:10.1109/IC3.2019.8844920
|
|
|
[15]
|
Mobile anti-phishing: Approaches and challenges
Information Security Journal: A Global Perspective,
2019
DOI:10.1080/19393555.2019.1691293
|
|
|
[16]
|
A Content-Based Approach for Detecting Smishing in Mobile Environment
SSRN Electronic Journal ,
2019
DOI:10.2139/ssrn.3356256
|
|
|
[17]
|
A Case-Based Reasoning Approach for Automatic Adaptation of Classifiers in Mobile Phishing Detection
Journal of Computer Networks and Communications,
2019
DOI:10.1155/2019/7198435
|
|
|
[18]
|
SuiT: Secure User Interface Based on TrustZone
ICC 2019 - 2019 IEEE International Conference on Communications (ICC),
2019
DOI:10.1109/ICC.2019.8761616
|
|
|
[19]
|
Cyber Security in Parallel and Distributed Computing
2019
DOI:10.1002/9781119488330.ch12
|
|
|
[20]
|
UnPhishMe: Phishing Attack Detection by Deceptive Login Simulation through an Android Mobile App
2017 12th Asia Joint Conference on Information Security (AsiaJCIS),
2017
DOI:10.1109/AsiaJCIS.2017.19
|
|
|
[21]
|
Unleashing the Walking Dead
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security,
2017
DOI:10.1145/3133956.3134021
|
|
|
[22]
|
Unleashing the Walking Dead
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security,
2017
DOI:10.1145/3133956.3134021
|
|
|
[23]
|
Phishing detection based on newly registered domains
2016 IEEE International Conference on Big Data (Big Data),
2016
DOI:10.1109/BigData.2016.7841036
|
|
|
[24]
|
MP-Shield: A Framework for Phishing Detection in Mobile Devices
2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing,
2015
DOI:10.1109/CIT/IUCC/DASC/PICOM.2015.293
|
|
|