SmiDCA: An Anti-Smishing Model with Machine Learning Approach
暂无分享,去创建一个
[1] T. L. McCluskey,et al. Intelligent rule-based phishing websites classification , 2014, IET Inf. Secur..
[2] K. S. Kuppusamy,et al. PhiDMA - A phishing detection model with multi-filter approach , 2017, J. King Saud Univ. Comput. Inf. Sci..
[3] Kun-Hee Han,et al. Blackhole attack: user identity and password seize attack using honeypot , 2016, Journal of Computer Virology and Hacking Techniques.
[4] M. Coleman,et al. A computer readability formula designed for machine scoring. , 1975 .
[5] Jong Hyuk Park,et al. S-Detector: an enhanced security model for detecting Smishing attack for mobile computing , 2017, Telecommun. Syst..
[6] MJ Callaghan,et al. Game Based Learning for Teaching Electrical and Electronic Engineering , 2014 .
[7] Heeman Lee,et al. A Study on Realtime Detecting Smishing on Cloud Computing Environments , 2016 .
[8] Doaa Hassan,et al. On Determining the Most Effective Subset of Features for Detecting Phishing Websites , 2015 .
[9] R. Flesch. A new readability yardstick. , 1948, The Journal of applied psychology.
[10] Hossain Shahriar,et al. Mobile Phishing Attacks and Mitigation Techniques , 2015 .
[11] Noor Maizura Mohamad Noor,et al. A Hybrid Selection Method Based on HCELFS and SVM for the Diagnosis of Oral Cancer Staging , 2015 .
[12] Akebo Yamakami,et al. Towards filtering undesired short text messages using an online learning approach with semantic indexing , 2017, Expert Syst. Appl..
[13] Mohd Faizal Abdollah,et al. Phishing detection taxonomy for mobile device , 2013 .
[14] El-Sayed M. El-Alfy. Detection of Phishing Websites Based on Probabilistic Neural Networks and K-Medoids Clustering , 2017, Computer/law journal.
[15] Weidong Chen,et al. Node-Pancyclic Properties of Biswapped Networks Based on Cycles in Their Factor Networks , 2017, Comput. J..
[16] Tarek M. Mahmoud,et al. SMS Spam Filtering Technique Based on Artificial Immune System , 2012 .
[17] Yongzhen Li,et al. Secure Short URL Generation Method that Recognizes Risk of Target URL , 2017, Wirel. Pers. Commun..
[18] Isabelle Guyon,et al. An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..
[19] Huajun Huang,et al. A SVM-based Technique to Detect Phishing URLs , 2012 .
[20] Chang Choi,et al. CNN‐based malicious user detection in social networks , 2018, Concurr. Comput. Pract. Exp..
[21] Aderemi Oluyinka Adewumi,et al. Classification of Phishing Email Using Random Forest Machine Learning Technique , 2014, J. Appl. Math..
[22] Liu Ke-fei. Feature Selection Algorithm in Email Classification , 2006 .
[23] Harry Wechsler,et al. Phishing detection and impersonated entity discovery using Conditional Random Field and Latent Dirichlet Allocation , 2013, Comput. Secur..
[24] Jong Hyuk Park,et al. Security Considerations for Smart Phone Smishing Attacks , 2014 .
[25] R. Gunning. The Technique of Clear Writing. , 1968 .
[26] Rupa Hiremath,et al. Cellular Network Fraud & Security, Jamming Attack and Defenses , 2016 .
[27] Yoojae Won,et al. Property Analysis of SMS Spam Using Text Mining , 2017, MUE/FutureTech.
[28] Md. Rafiqul Islam,et al. A multi-tier phishing detection and filtering approach , 2013, J. Netw. Comput. Appl..
[29] Beomsoo Kim,et al. Improving Security Awareness about Smishing through Experiment on the Optimistic Bias on Risk Perception , 2016 .
[30] Sarah Jane Delany,et al. SMS spam filtering: Methods and data , 2012, Expert Syst. Appl..
[31] G. Harry McLaughlin,et al. SMOG Grading - A New Readability Formula. , 1969 .
[32] Harry Wechsler,et al. phishGILLNET—phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training , 2012 .
[33] Mohd Azlishah Othman,et al. Advanced Computer and Communication Engineering Technology , 2015 .
[34] Dea-woo Park,et al. Forensic Analysis of MERS Smishing Hacking Attacks and Prevention , 2016 .
[35] Manish Mandloi,et al. Adaptive multiple stage K-best successive interference cancellation algorithm for MIMO detection , 2017, Telecommun. Syst..