Comparative Analysis of Mobile Phishing Detection and Prevention Approaches
暂无分享,去创建一个
[1] Mohd Faizal Abdollah,et al. Phishing detection taxonomy for mobile device , 2013 .
[2] Longfei Wu,et al. MobiFish: A lightweight anti-phishing scheme for mobile phones , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).
[3] Tao Guo,et al. A behavior analysis based Mobile Malware Defense System , 2012, ICSPCS.
[4] Weili Han,et al. Anti-Phishing by Smart Mobile Device , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).
[5] Suresh Sankaranarayanan,et al. Biometric security mechanism in Mobile paymentts , 2010, 2010 Seventh International Conference on Wireless and Optical Communications Networks - (WOCN).
[6] Ankit Kumar Jain,et al. Phishing Detection: Analysis of Visual Similarity Based Approaches , 2017, Secur. Commun. Networks.
[7] Ankit Kumar Jain,et al. A novel approach to protect against phishing attacks at client side using auto-updated white-list , 2016, EURASIP Journal on Information Security.
[8] Justin Zhan,et al. Online Banking Authentication Using Mobile Phones , 2010, 2010 5th International Conference on Future Information Technology.
[9] Patrick Traynor,et al. Detecting Mobile Malicious Webpages in Real Time , 2017, IEEE Transactions on Mobile Computing.
[10] Steve Love,et al. Designing a Mobile Game to Teach Conceptual Knowledge of Avoiding 'Phishing Attacks' , 2012 .
[11] Giovanni Bottazzi,et al. MP-Shield: A Framework for Phishing Detection in Mobile Devices , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[12] Hyotaek Lim,et al. Online banking authentication system using mobile-OTP with QR-code , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.
[13] Yoshimi Teshigawara,et al. A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones , 2006, WISA.
[14] Hossain Shahriar,et al. Mobile Phishing Attacks and Mitigation Techniques , 2015 .
[15] Dongho Won,et al. A mobile based anti-phishing authentication scheme using QR code , 2011, International Conference on Mobile IT Convergence.
[16] Daniele Sgandurra,et al. A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.
[17] Do Van Thanh,et al. Simple Strong Authentication for Internet Applications Using Mobile Phones , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.