2017
DOI: 10.1504/ijie.2017.087014
|View full text |Cite
|
Sign up to set email alerts
|

Security model on mobile banking application: attack simulation and countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Beyond QR codes, the expansive functionalities of mobile banking apps, such as easy fund transfers, bill payments, and account management, have been pivotal in their widespread adoption. Kouraogo, et al (2017) highlighted the security concerns associated with mobile banking applications, emphasizing the need for robust countermeasures to protect user data and ensure secure transactions. In summary, the adoption of technology in mobile banking applications reflects the industry's commitment to offering users a seamless, secure, and efficient banking experience, catering to a wide range of financial needs.…”
Section: B Adoption Of Technology In Mobile Banking Applicationsmentioning
confidence: 99%
“…Beyond QR codes, the expansive functionalities of mobile banking apps, such as easy fund transfers, bill payments, and account management, have been pivotal in their widespread adoption. Kouraogo, et al (2017) highlighted the security concerns associated with mobile banking applications, emphasizing the need for robust countermeasures to protect user data and ensure secure transactions. In summary, the adoption of technology in mobile banking applications reflects the industry's commitment to offering users a seamless, secure, and efficient banking experience, catering to a wide range of financial needs.…”
Section: B Adoption Of Technology In Mobile Banking Applicationsmentioning
confidence: 99%
“…Authors in [21] have researched Android banking application attacks and suggested defences against them. They examined the characteristics of various attack types, including keylogging and phishing, and they suggested techniques for identifying and counteracting them.…”
Section: Related Workmentioning
confidence: 99%