SmiDCA: An Anti-Smishing Model with Machine Learning Approach

[1]  T. L. McCluskey,et al.  Intelligent rule-based phishing websites classification , 2014, IET Inf. Secur..

[2]  K. S. Kuppusamy,et al.  PhiDMA - A phishing detection model with multi-filter approach , 2017, J. King Saud Univ. Comput. Inf. Sci..

[3]  Kun-Hee Han,et al.  Blackhole attack: user identity and password seize attack using honeypot , 2016, Journal of Computer Virology and Hacking Techniques.

[4]  M. Coleman,et al.  A computer readability formula designed for machine scoring. , 1975 .

[5]  Jong Hyuk Park,et al.  S-Detector: an enhanced security model for detecting Smishing attack for mobile computing , 2017, Telecommun. Syst..

[6]  MJ Callaghan,et al.  Game Based Learning for Teaching Electrical and Electronic Engineering , 2014 .

[7]  Heeman Lee,et al.  A Study on Realtime Detecting Smishing on Cloud Computing Environments , 2016 .

[8]  Doaa Hassan,et al.  On Determining the Most Effective Subset of Features for Detecting Phishing Websites , 2015 .

[9]  R. Flesch A new readability yardstick. , 1948, The Journal of applied psychology.

[10]  Hossain Shahriar,et al.  Mobile Phishing Attacks and Mitigation Techniques , 2015 .

[11]  Noor Maizura Mohamad Noor,et al.  A Hybrid Selection Method Based on HCELFS and SVM for the Diagnosis of Oral Cancer Staging , 2015 .

[12]  Akebo Yamakami,et al.  Towards filtering undesired short text messages using an online learning approach with semantic indexing , 2017, Expert Syst. Appl..

[13]  Mohd Faizal Abdollah,et al.  Phishing detection taxonomy for mobile device , 2013 .

[14]  El-Sayed M. El-Alfy Detection of Phishing Websites Based on Probabilistic Neural Networks and K-Medoids Clustering , 2017, Computer/law journal.

[15]  Weidong Chen,et al.  Node-Pancyclic Properties of Biswapped Networks Based on Cycles in Their Factor Networks , 2017, Comput. J..

[16]  Tarek M. Mahmoud,et al.  SMS Spam Filtering Technique Based on Artificial Immune System , 2012 .

[17]  Yongzhen Li,et al.  Secure Short URL Generation Method that Recognizes Risk of Target URL , 2017, Wirel. Pers. Commun..

[18]  Isabelle Guyon,et al.  An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..

[19]  Huajun Huang,et al.  A SVM-based Technique to Detect Phishing URLs , 2012 .

[20]  Chang Choi,et al.  CNN‐based malicious user detection in social networks , 2018, Concurr. Comput. Pract. Exp..

[21]  Aderemi Oluyinka Adewumi,et al.  Classification of Phishing Email Using Random Forest Machine Learning Technique , 2014, J. Appl. Math..

[22]  Liu Ke-fei Feature Selection Algorithm in Email Classification , 2006 .

[23]  Harry Wechsler,et al.  Phishing detection and impersonated entity discovery using Conditional Random Field and Latent Dirichlet Allocation , 2013, Comput. Secur..

[24]  Jong Hyuk Park,et al.  Security Considerations for Smart Phone Smishing Attacks , 2014 .

[25]  R. Gunning The Technique of Clear Writing. , 1968 .

[26]  Rupa Hiremath,et al.  Cellular Network Fraud & Security, Jamming Attack and Defenses , 2016 .

[27]  Yoojae Won,et al.  Property Analysis of SMS Spam Using Text Mining , 2017, MUE/FutureTech.

[28]  Md. Rafiqul Islam,et al.  A multi-tier phishing detection and filtering approach , 2013, J. Netw. Comput. Appl..

[29]  Beomsoo Kim,et al.  Improving Security Awareness about Smishing through Experiment on the Optimistic Bias on Risk Perception , 2016 .

[30]  Sarah Jane Delany,et al.  SMS spam filtering: Methods and data , 2012, Expert Syst. Appl..

[31]  G. Harry McLaughlin,et al.  SMOG Grading - A New Readability Formula. , 1969 .

[32]  Harry Wechsler,et al.  phishGILLNET—phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training , 2012 .

[33]  Mohd Azlishah Othman,et al.  Advanced Computer and Communication Engineering Technology , 2015 .

[34]  Dea-woo Park,et al.  Forensic Analysis of MERS Smishing Hacking Attacks and Prevention , 2016 .

[35]  Manish Mandloi,et al.  Adaptive multiple stage K-best successive interference cancellation algorithm for MIMO detection , 2017, Telecommun. Syst..