2015
DOI: 10.1007/978-3-662-47895-0_60
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Realtime Detecting Smishing on Cloud Computing Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…During the literature survey, it was observed that few research papers [ 9 , 10 , 12 – 18 ] are contributing to the study of SMS classification using Neural Network whereas other research papers [ 4 , 8 , 11 , 19 – 22 ] are related to the study of smishing detection and evaluating the detection models using various techniques. Some research papers [ 23 – 28 ] are focused on the detection of phishing.…”
Section: Related Work Studymentioning
confidence: 99%
See 1 more Smart Citation
“…During the literature survey, it was observed that few research papers [ 9 , 10 , 12 – 18 ] are contributing to the study of SMS classification using Neural Network whereas other research papers [ 4 , 8 , 11 , 19 – 22 ] are related to the study of smishing detection and evaluating the detection models using various techniques. Some research papers [ 23 – 28 ] are focused on the detection of phishing.…”
Section: Related Work Studymentioning
confidence: 99%
“…Lee et al. [ 8 ] implemented a cloud-based virtual environment to verify the downloading of a malicious executable file and in turn detects the maliciousness of the message.…”
Section: Related Work Studymentioning
confidence: 99%
“…This information includes contacts, notes, financial information, pictures, etc. This trend subsequently steals personal information such as security cards, photo identification, or accreditation certificates for other crimes [52]. Various forms of text messages are also found to be compromised by malware, such as the provision of coupons to wedding invitations.…”
Section: G Smsmentioning
confidence: 99%
“…Phishing is mostly carried out through technological means, such as emails and phone calls. Phishing attacks frequently take the shape of an email purporting to be from a reputable organisation, such as your bank, [95] the tax department, or another trustworthy entity, as seen in figure 3. Now we'll go over the most frequent sorts of phishing assaults in this part.…”
Section: Phishing Attackmentioning
confidence: 99%