Botnets unveiled: A comprehensive survey on evolving threats and defense strategies
M Asadi, MAJ Jamali, A Heidari… - Transactions on …, 2024 - Wiley Online Library
Botnets have emerged as a significant internet security threat, comprising networks of
compromised computers under the control of command and control (C&C) servers. These …
compromised computers under the control of command and control (C&C) servers. These …
Advancements of SMS Spam Detection: A Comprehensive Survey of NLP and ML Techniques
In the digital age, the ubiquity of text messaging has unfortunately paved the way for SMS
phishing, or'smishing,'a deceptive practice where fraudsters dispatch fraudulent messages …
phishing, or'smishing,'a deceptive practice where fraudsters dispatch fraudulent messages …
Commercial anti-smishing tools and their comparative effectiveness against modern threats
Smishing, also known as SMS phishing, is a type of fraudulent communication in which an
attacker disguises SMS communications to deceive a target into providing their sensitive …
attacker disguises SMS communications to deceive a target into providing their sensitive …
Rule-based framework for detection of smishing messages in mobile environment
AK Jain, BB Gupta - Procedia Computer Science, 2018 - Elsevier
Smishing is a cyber-security attack, which utilizes Short Message Service (SMS) to steal
personal credentials of mobile users. The trust level of users on their smart devices has …
personal credentials of mobile users. The trust level of users on their smart devices has …
Feature based approach for detection of smishing messages in the mobile environment
AK Jain, BB Gupta - … Anthology on Securing Mobile Technologies and …, 2021 - igi-global.com
Smishing is a security attack that is performed by sending a fake message intending to steal
personal credentials of mobile users. Nowadays, smishing attack becomes popular due to …
personal credentials of mobile users. Nowadays, smishing attack becomes popular due to …
SMS phishing and mitigation approaches
Smishing is an attack targeted to mobile devices in which the attacker sends text messages
containing malicious links, phone numbers or E-Mail IDs to the victim and the attacker aims …
containing malicious links, phone numbers or E-Mail IDs to the victim and the attacker aims …
A comprehensive survey on social engineering attacks, countermeasures, case study, and research challenges
Social engineering attacks are inevitable and imperil the integrity, security, and
confidentiality of the information used on social media platforms. Prominent technologies …
confidentiality of the information used on social media platforms. Prominent technologies …
COPS: A Compact On-Device Pipeline for Real-Time Smishing Detection
BSS Harichandana, S Kumar… - 2024 IEEE 21st …, 2024 - ieeexplore.ieee.org
Smartphones have become indispensable in our daily lives and can do almost everything,
from communication to online shopping. However, with the increased usage, cybercrime …
from communication to online shopping. However, with the increased usage, cybercrime …
[PDF][PDF] Enhancing Cybersecurity: Machine Learning and Natural Language Processing for Arabic Phishing Email Detection
S Salloum - University of Salford, 2024 - salford-repository.worktribe.com
COPS: A Compact On-device Pipeline for real-time Smishing detection
S Kumar, MB Ujjinakoppa, BRK Raja - arXiv preprint arXiv:2402.04173, 2024 - arxiv.org
Smartphones have become indispensable in our daily lives and can do almost everything,
from communication to online shopping. However, with the increased usage, cybercrime …
from communication to online shopping. However, with the increased usage, cybercrime …