2019
DOI: 10.1007/978-981-13-6052-7_15
|View full text |Cite
|
Sign up to set email alerts
|

Anti-phishing Models for Mobile Application Development: A Review Paper

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 25 publications
0
0
0
Order By: Relevance
“…Messages are being sent from the targeted user's smartphone to any other receiver. The assailant has the power to send any type of data to any Bluetooth-enabled device within range [40].…”
Section: Wireless Phishingmentioning
confidence: 99%
See 1 more Smart Citation
“…Messages are being sent from the targeted user's smartphone to any other receiver. The assailant has the power to send any type of data to any Bluetooth-enabled device within range [40].…”
Section: Wireless Phishingmentioning
confidence: 99%
“…The Phisher uses keyloggers to gather private data about the clients, including their names, addresses, passwords, as well as other confidential information. Key loggers are additionally useful for non-phishing purposes, such as monitoring a child's Internet usage [40]. Key loggers may additionally be employed in various ways, including recognizing changes in URLs and logging information as a Browser Helper Object (BHO) which permits the hacker to influence the attributes of all Internet Explorers, observing keyboard and mouse input as a driver for the device, and observing client's input and show as a screen logger [18][63].…”
Section: Mobile Phishing Techniquesmentioning
confidence: 99%