"Mobile Phishing Attacks and Mitigation Techniques"
written by Hossain Shahriar, Tulin Klintic, Victor Clincy,
published by Journal of Information Security, Vol.6 No.3, 2015
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Human Factors in Cybersecurity: Issues and Challenges in Big Data
2020
[2] Do not jail my app: Detecting the Android plugin environments by time lag contradiction
2020
[3] SMS Phishing and Mitigation Approaches
2019
[4] Mobile anti-phishing: Approaches and challenges
2019
[5] Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
2019 IEEE Symposium on Security and Privacy (SP), 2019
[6] SuiT: Secure User Interface Based on TrustZone
2019
[7] A Study on the Use of Mobile-specific HTML5 WebAPI Calls on the Web
2019
[8] SMARTPHONE TRIGGERED SECURITY CHALLENGES-ISSUES, CASE STUDIES AND PREVENTION
2019
[9] A Content-Based Approach for Detecting Smishing in Mobile Environment
2019
[10] Mobile Phishing Websites Detection and Prevention Using Data Mining Techniques.
2019
[11] A Case-Based Reasoning Approach for Automatic Adaptation of Classifiers in Mobile Phishing Detection
2019
[12] Mobile Phishing Websites Detection and Prevention Using Data Mining Techniques
2019
[13] SNS Use, Risk, and Executive Behavior
2018
[14] Revealing the important features of mobile phishing
2018
[15] Non-invasive Privilege Escalation through Mobile and IoT System Interface: Threats and Mitigation
ProQuest Dissertations Publishing, 2018
[16] SmiDCA: An Anti-Smishing Model with Machine Learning Approach
The Computer Journal, 2018
[17] Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home
2018
[18] A survey about attack and defence phishing techniques
2018
[19] A Mobile-Based Phishing Detector App for E-Mails
2017
[20] Phishing Campaigns in Corporate Water
2017
[21] Cloud Messaging Service for Preventing Smishing Attack
2017
[22] A Mobile-Based Phishing Detector App for E-Mails.
Computing & Information Systems, 2017
[23] Unleashing the walking dead: Understanding cross-app remote infections on mobile webviews
CCS 2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
[24] Comparative analysis of mobile phishing detection and prevention approaches
Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1, 2017
[25] Mobile Phishing Detection using Naive Bayesian Algorithm
2017
[26] UnPhishMe: Phishing Attack Detection by Deceptive Login Simulation through an Android Mobile App
2017
[27] Analizando el nivel de seguridad del entorno de Android
2016
[28] Designing secure web and mobile-based information system for dissemination of students' examination results: the suitability of soft design science …
International Journal of Computing and ICT Research, 2016
[29] Phishing detection based on newly registered domains
2016
[30] CELLPOTS SEBAGAI ANTI-PHISING ATTACK PADA MOBILE CELLULAR NETWORK
2016
[31] MP-Shield: A Framework for Phishing Detection in Mobile Devices
Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on, 2015