Lee et al., 2015 - Google Patents
A study on realtime detecting smishing on cloud computing environmentsLee et al., 2015
View PDF- Document ID
- 8206626686505315050
- Author
- Lee A
- Kim K
- Lee H
- Jun M
- Publication year
- Publication venue
- Advanced Multimedia and Ubiquitous Engineering: Future Information Technology Volume 2
External Links
Snippet
Learning By smartphone developed, mobile malicious code will produce many new species of fraud technique that Smishing using a mobile malicious code was born. Damage of Smishing Because of the increase, against this possibility is urgent. In this paper, filtering …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/18—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints using printed characters having additional code marks or containing code marks, e.g. the character being composed of individual strokes of different shape, each representing a different code value
- G06K9/186—Recognition of characters printed with magnetic ink
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01M—TESTING STATIC OR DYNAMIC BALANCE OF MACHINES OR STRUCTURES; TESTING STRUCTURES OR APPARATUS NOT OTHERWISE PROVIDED FOR
- G01M15/00—Testing of engines
- G01M15/04—Testing of internal-combustion engines, e.g. diagnostic testing of piston engines
- G01M15/12—Testing of internal-combustion engines, e.g. diagnostic testing of piston engines by monitoring vibrations
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Andronio et al. | Heldroid: Dissecting and detecting mobile ransomware | |
| US10102372B2 (en) | Behavior profiling for malware detection | |
| KR102130122B1 (en) | Systems and methods for detecting online fraud | |
| Malik et al. | CREDROID: Android malware detection by network traffic analysis | |
| EP3029593B1 (en) | System and method of limiting the operation of trusted applications in the presence of suspicious programs | |
| US10284543B2 (en) | System and method for secure online authentication | |
| US10360402B2 (en) | Intercepting sensitive data using hashed candidates | |
| CN105701423B (en) | Date storage method and device applied to high in the clouds payment transaction | |
| Kim et al. | Attack detection application with attack tree for mobile system using log analysis | |
| Baskaran et al. | Measuring the leakage and exploitability of authentication secrets in super-apps: The wechat case | |
| Mahmud et al. | Cardpliance:{PCI}{DSS} compliance of android applications | |
| Choudhary et al. | Comparative analysis of mobile phishing detection and prevention approaches | |
| Choi et al. | Personal information leakage detection method using the inference-based access control model on the Android platform | |
| Zhang et al. | ScanMe mobile: a cloud-based Android malware analysis service | |
| Ojugo et al. | A social engineering detection model for the mobile smartphone clients | |
| Lee et al. | A study on realtime detecting smishing on cloud computing environments | |
| Aparicio et al. | App-based detection of vulnerable implementations of OTP SMS APIs in the banking sector | |
| Ferreira | Malicious URL detection using machine learning algorithms | |
| Kim et al. | A study on the digital forensic investigation method of clever malware in IoT devices | |
| Rafsanjani et al. | A evaluating security and privacy features of quick response code scanners: A comparative study | |
| Shahriar et al. | Mobile anti-phishing: Approaches and challenges | |
| US12008105B2 (en) | Protected QR code scanner using operational system override | |
| CN107431693B (en) | Message sender authenticity verification | |
| KR20140112785A (en) | Financial service system and method thereof, and apparatus applied to the same | |
| Hutchinson et al. | Forensic analysis of spy applications in android devices |