An investigation of anonymous and spoof SMS resources used for the purposes of cyberstalking
G Horsman, LR Conniss - Digital investigation, 2015 - Elsevier
Abstract In 2012, the United Kingdom actively sought to tackle acts of stalking through
amendments to the Protection from Harassment Act 1997. Now, not only is stalking a …
amendments to the Protection from Harassment Act 1997. Now, not only is stalking a …
[PDF][PDF] Evaluating the Possibility to Perpetrate Tunneling Attacks Exploiting Short-Message-Service.
In the cyber-security context, tunneling systems are exploited to bypass network restrictions
to communicate outside of the targeted perimeter, without being detected. Such attacks …
to communicate outside of the targeted perimeter, without being detected. Such attacks …
A new covert channel over cellular voice channel in smartphones
B Aloraini, D Johnson, B Stackpole… - arXiv preprint arXiv …, 2015 - arxiv.org
Investigating network covert channels in smartphones has become increasingly important as
smartphones have recently replaced the role of traditional computers. Smartphones are …
smartphones have recently replaced the role of traditional computers. Smartphones are …
Using short message service (SMS) to deploy android exploits
S Yubo, Z Zhiwei, X Yunfeng - 2014 - IET
Short Message Service (SMS) provided by the mobile communication system is a widely
used service, almost all the mobile terminals support the short message protocol. In this …
used service, almost all the mobile terminals support the short message protocol. In this …
[图书][B] A new covert channel over cellular network voice channel
BS Aloraini - 2014 - search.proquest.com
Smartphone security has become increasingly more significant as smartphones become a
more important part of many individuals' daily lives. Smartphones undergo all computer …
more important part of many individuals' daily lives. Smartphones undergo all computer …
Implementation of concatenated short messaging service in a campus environment
HKS Premadasa, RGN Meegama - 2013 8th International …, 2013 - ieeexplore.ieee.org
Integrating a secure short messaging system with message concatenation into a learning
management system (LMS), provides a facility for teachers to communicate with students …
management system (LMS), provides a facility for teachers to communicate with students …
[PDF][PDF] On the Feasibility of Covert Channels through Short-Message-Service.
Abstract Short-Message-Service (SMS) is one of the most used ways to exchange text
messages offered by mobile networks. In this paper, we explore the feasibility of establishing …
messages offered by mobile networks. In this paper, we explore the feasibility of establishing …
An architecture for analysis of mobile botnet detection using machine learning
A Patade, N Shekokar - Advances in Computing and Data Sciences: Third …, 2019 - Springer
The smart-phone has become a critical cybernetic victim especially of cellular botnets. The
current exploration examines mobile botnet attacks for Android smart-phone launched from …
current exploration examines mobile botnet attacks for Android smart-phone launched from …
Publications of M Zubair Rafique
DNRD Bites, DN Seminars - cs.kuleuven.be
Department of Computer Science search home imec-DistriNet Research Group, KU Leuven
Menu Login account_box About us keyboard_arrow_down Contact information How to …
Menu Login account_box About us keyboard_arrow_down Contact information How to …
Concealed data in two way text messaging: A framework for interactive mobile learning environment
HKS Premadasa, RGN Meegama - … Conference on Advances …, 2012 - ieeexplore.ieee.org
A major limitation in two-way texting is sending back a part of received data with the reply
message. This limitation results in users of a mobile learning environment being unable to …
message. This limitation results in users of a mobile learning environment being unable to …