Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Mobile Phishing Attacks and Mitigation Techniques"
written by Hossain Shahriar, Tulin Klintic, Victor Clincy,
published by Journal of Information Security, Vol.6 No.3, 2015
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Using Behavioral Profiling through Keystrokes Dynamics and Location Verification authentication as a Method of Securing Mobile Banking Transactions
2021
[2] Review on Mobile Attacks: Operating System, Threats and Solution
2021
[3] A Study on the Digital Forensic Investigation Method of Clever Malware in IoT Devices
2020
[4] New hybrid framework to detect phishing web pages, based on rules and variant selection of features
2020
[5] Human Factors in Cybersecurity: Issues and Challenges in Big Data
2020
[6] Do not jail my app: Detecting the Android plugin environments by time lag contradiction
2020
[7] Smishing detector: A security model to detect smishing through SMS content analysis and url behavior analysis
2020
[8] Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures
2020
[9] A Cost-Effective OCR Implementation to Prevent Phishing on Mobile Platforms
2020
[10] Characterizing Emerging Cybersecurity Threats: An Ecosystem Approach
2020
[11] Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
2019 IEEE Symposium on Security and Privacy (SP), 2019
[12] SMS Phishing and Mitigation Approaches
2019
[13] Mobile anti-phishing: Approaches and challenges
2019
[14] SuiT: Secure User Interface Based on TrustZone
2019
[15] A Study on the Use of Mobile-specific HTML5 WebAPI Calls on the Web
2019
[16] SMARTPHONE TRIGGERED SECURITY CHALLENGES-ISSUES, CASE STUDIES AND PREVENTION
2019
[17] A Content-Based Approach for Detecting Smishing in Mobile Environment
2019
[18] Mobile Phishing Websites Detection and Prevention Using Data Mining Techniques.
2019
[19] A Case-Based Reasoning Approach for Automatic Adaptation of Classifiers in Mobile Phishing Detection
2019
[20] Mobile Phishing Websites Detection and Prevention Using Data Mining Techniques
2019
[21] Non-invasive Privilege Escalation through Mobile and IoT System Interface: Threats and Mitigation
ProQuest Dissertations Publishing, 2018
[22] SmiDCA: An Anti-Smishing Model with Machine Learning Approach
The Computer Journal, 2018
[23] Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home
2018
[24] A survey about attack and defence phishing techniques
2018
[25] SNS Use, Risk, and Executive Behavior
2018
[26] Revealing the important features of mobile phishing
2018
[27] 스미싱 공격 방지를 위한 클라우드 메시징 서비스
2017
[28] A Mobile-Based Phishing Detector App for E-Mails
2017
[29] Phishing Campaigns in Corporate Water
2017
[30] Cloud Messaging Service for Preventing Smishing Attack
2017
[31] A Mobile-Based Phishing Detector App for E-Mails.
Computing & Information Systems, 2017
[32] Unleashing the walking dead: Understanding cross-app remote infections on mobile webviews
CCS 2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
[33] Comparative analysis of mobile phishing detection and prevention approaches
Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1, 2017
[34] Mobile Phishing Detection using Naive Bayesian Algorithm
2017
[35] UnPhishMe: Phishing Attack Detection by Deceptive Login Simulation through an Android Mobile App
2017
[36] Analizando el nivel de seguridad del entorno de Android
2016
[37] Designing secure web and mobile-based information system for dissemination of students' examination results: the suitability of soft design science …
International Journal of Computing and ICT Research, 2016
[38] Phishing detection based on newly registered domains
2016
[39] CELLPOTS SEBAGAI ANTI-PHISING ATTACK PADA MOBILE CELLULAR NETWORK
2016
[40] Designing Secure Web and Mobile-Based Information System for Dissemination of Students' Examination Results: The Suitability of Soft Design Science …
2016
[41] MP-Shield: A Framework for Phishing Detection in Mobile Devices
Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on, 2015
[42] Preventing and Detecting State Inference Attacks on Android
[43] Managing Editors
[44] The Current Phishing Techniques–Perspective of the Nigerian Environment
[45] The Human Attack Surface Framework for Phishing
Free SCIRP Newsletters
Copyright © 2006-2021 Scientific Research Publishing Inc. All Rights Reserved.
Top