Botnets unveiled: A comprehensive survey on evolving threats and defense strategies

M Asadi, MAJ Jamali, A Heidari… - Transactions on …, 2024 - Wiley Online Library
Botnets have emerged as a significant internet security threat, comprising networks of
compromised computers under the control of command and control (C&C) servers. These …

Advancements of SMS Spam Detection: A Comprehensive Survey of NLP and ML Techniques

MR Al Saidat, SY Yerima, K Shaalan - Procedia Computer Science, 2024 - Elsevier
In the digital age, the ubiquity of text messaging has unfortunately paved the way for SMS
phishing, or'smishing,'a deceptive practice where fraudsters dispatch fraudulent messages …

Commercial anti-smishing tools and their comparative effectiveness against modern threats

D Timko, ML Rahman - Proceedings of the 16th ACM Conference on …, 2023 - dl.acm.org
Smishing, also known as SMS phishing, is a type of fraudulent communication in which an
attacker disguises SMS communications to deceive a target into providing their sensitive …

Rule-based framework for detection of smishing messages in mobile environment

AK Jain, BB Gupta - Procedia Computer Science, 2018 - Elsevier
Smishing is a cyber-security attack, which utilizes Short Message Service (SMS) to steal
personal credentials of mobile users. The trust level of users on their smart devices has …

Feature based approach for detection of smishing messages in the mobile environment

AK Jain, BB Gupta - … Anthology on Securing Mobile Technologies and …, 2021 - igi-global.com
Smishing is a security attack that is performed by sending a fake message intending to steal
personal credentials of mobile users. Nowadays, smishing attack becomes popular due to …

SMS phishing and mitigation approaches

S Mishra, D Soni - 2019 twelfth international conference on …, 2019 - ieeexplore.ieee.org
Smishing is an attack targeted to mobile devices in which the attacker sends text messages
containing malicious links, phone numbers or E-Mail IDs to the victim and the attacker aims …

A comprehensive survey on social engineering attacks, countermeasures, case study, and research challenges

T Rathod, NK Jadav, S Tanwar, A Alabdulatif… - Information Processing …, 2025 - Elsevier
Social engineering attacks are inevitable and imperil the integrity, security, and
confidentiality of the information used on social media platforms. Prominent technologies …

COPS: A Compact On-Device Pipeline for Real-Time Smishing Detection

BSS Harichandana, S Kumar… - 2024 IEEE 21st …, 2024 - ieeexplore.ieee.org
Smartphones have become indispensable in our daily lives and can do almost everything,
from communication to online shopping. However, with the increased usage, cybercrime …

COPS: A Compact On-device Pipeline for real-time Smishing detection

S Kumar, MB Ujjinakoppa, BRK Raja - arXiv preprint arXiv:2402.04173, 2024 - arxiv.org
Smartphones have become indispensable in our daily lives and can do almost everything,
from communication to online shopping. However, with the increased usage, cybercrime …