Scientific Research An Academic Publisher
OPEN ACCESS
Add your e-mail address to receive free newsletters from SCIRP.
Select Journal AA AAD AAR AASoci AAST ABB ABC ABCR ACES ACS ACT AD ADR AE AER AHS AID AiM AIT AJAC AJC AJCC AJCM AJIBM AJMB AJOR AJPS ALAMT ALC ALS AM AMI AMPC ANP APD APE APM ARS ARSci AS ASM BLR CC CE CellBio ChnStd CM CMB CN CRCM CS CSTA CUS CWEEE Detection EMAE ENG EPE ETSN FMAR FNS GEP GIS GM Graphene GSC Health IB ICA IIM IJAA IJAMSC IJCCE IJCM IJCNS IJG IJIDS IJIS IJMNTA IJMPCERO IJNM IJOC IJOHNS InfraMatics JACEN JAMP JASMI JBBS JBCPR JBiSE JBM JBNB JBPC JCC JCDSA JCPT JCT JDAIP JDM JEAS JECTC JEMAA JEP JFCMV JFRM JGIS JHEPGC JHRSS JIBTVA JILSA JIS JMF JMGBND JMMCE JMP JPEE JQIS JSBS JSEA JSEMAT JSIP JSS JSSM JST JTR JTST JTTs JWARP LCE MC ME MI MME MNSMS MPS MR MRC MRI MSA MSCE NJGC NM NR NS OALib OALibJ ODEM OJA OJAB OJAcct OJAnes OJAP OJApo OJAppS OJAPr OJAS OJBD OJBIPHY OJBM OJC OJCB OJCD OJCE OJCM OJD OJDer OJDM OJE OJEE OJEM OJEMD OJEpi OJER OJF OJFD OJG OJGas OJGen OJI OJIC OJIM OJINM OJL OJM OJMC OJMetal OJMH OJMI OJMIP OJML OJMM OJMN OJMP OJMS OJMSi OJN OJNeph OJO OJOG OJOGas OJOp OJOph OJOPM OJOTS OJPathology OJPC OJPChem OJPed OJPM OJPP OJPS OJPsych OJRA OJRad OJRD OJRM OJS OJSS OJSST OJST OJSTA OJTR OJTS OJU OJVM OPJ POS PP PST PSYCH SAR SCD SGRE SM SN SNL Soft SS TEL TI UOAJ VP WET WJA WJCD WJCMP WJCS WJET WJM WJNS WJNSE WJNST WJV WSN YM
More>>
Kumar, N. and Chaudhary, P. (2017) Mobile Phishing Detection using Naive Bayesian Algorithm. International Journal of Computer Science and Network Security, 17, 142-147.
has been cited by the following article:
TITLE: Phishing Techniques in Mobile Devices
AUTHORS: Belal Amro
KEYWORDS: Malware, Phishing, Anti-Phishing, Mobile Device, Mobile Application, Security, Privacy
JOURNAL NAME: Journal of Computer and Communications, Vol.6 No.2, February 13, 2018
ABSTRACT: The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to performing critical and sensitive tasks like money payments. Since the mobile device is accompanying a person most of his time, it is highly probably that it includes personal and sensitive data for that person. The increased use of mobile devices in daily life made mobile systems an excellent target for attacks. One of the most important attacks is phishing attack in which an attacker tries to get the credential of the victim and impersonate him. In this paper, analysis of different types of phishing attacks on mobile devices is provided. Mitigation techniques—anti-phishing techniques—are also analyzed. Assessment of each technique and a summary of its advantages and disadvantages is provided. At the end, important steps to guard against phishing attacks are provided. The aim of the work is to put phishing attacks on mobile systems in light, and to make people aware of these attacks and how to avoid them.
Related Articles:
Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse
Bogdan Denny Czejdo, Erik M. Ferragut, John R. Goodall, Jason Laska
DOI: 10.4236/ijcns.2012.529069 4,342 Downloads 7,653 Views Citations
Pub. Date: September 18, 2012
Mobile Phishing Attacks and Mitigation Techniques
Hossain Shahriar, Tulin Klintic, Victor Clincy
DOI: 10.4236/jis.2015.63021 6,693 Downloads 8,871 Views Citations
Pub. Date: June 30, 2015
Wireless Network Security: The Mobile Agent Approach
Olatunde Abiona, Adeniran Oluwaranti, Ayodeji Oluwatope, Surura Bello, Clement Onime, Mistura Sanni, Lawrence Kehinde
DOI: 10.4236/ijcns.2013.610046 4,235 Downloads 6,533 Views Citations
Pub. Date: October 25, 2013
A Multi-Classifier Based Prediction Model for Phishing Emails Detection Using Topic Modelling, Named Entity Recognition and Image Processing
C. Emilin Shyni, S. Sarju, S. Swamynathan
DOI: 10.4236/cs.2016.79217 1,287 Downloads 1,978 Views Citations
Pub. Date: July 26, 2016
Erratum to “PECS Block Provides Effective Postoperative Pain Management for Breast Cancer Surgery—A Retrospective Study”, [International Journal of Clinical Medicine, 2017, 8, 198-203]
Ichikawa Yuki, Hironobu Ueshima, Hiroshi Otake, Akira Kitamura
DOI: 10.4236/ijcm.2021.121005 44 Downloads 122 Views Citations
Pub. Date: January 21, 2021