[go: up one dir, main page]

Lee et al., 2015 - Google Patents

A study on realtime detecting smishing on cloud computing environments

Lee et al., 2015

View PDF
Document ID
8206626686505315050
Author
Lee A
Kim K
Lee H
Jun M
Publication year
Publication venue
Advanced Multimedia and Ubiquitous Engineering: Future Information Technology Volume 2

External Links

Snippet

Learning By smartphone developed, mobile malicious code will produce many new species of fraud technique that Smishing using a mobile malicious code was born. Damage of Smishing Because of the increase, against this possibility is urgent. In this paper, filtering …
Continue reading at ndl.ethernet.edu.et (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/18Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints using printed characters having additional code marks or containing code marks, e.g. the character being composed of individual strokes of different shape, each representing a different code value
    • G06K9/186Recognition of characters printed with magnetic ink
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/20Image acquisition
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01MTESTING STATIC OR DYNAMIC BALANCE OF MACHINES OR STRUCTURES; TESTING STRUCTURES OR APPARATUS NOT OTHERWISE PROVIDED FOR
    • G01M15/00Testing of engines
    • G01M15/04Testing of internal-combustion engines, e.g. diagnostic testing of piston engines
    • G01M15/12Testing of internal-combustion engines, e.g. diagnostic testing of piston engines by monitoring vibrations

Similar Documents

Publication Publication Date Title
Andronio et al. Heldroid: Dissecting and detecting mobile ransomware
US10102372B2 (en) Behavior profiling for malware detection
KR102130122B1 (en) Systems and methods for detecting online fraud
Malik et al. CREDROID: Android malware detection by network traffic analysis
EP3029593B1 (en) System and method of limiting the operation of trusted applications in the presence of suspicious programs
US10284543B2 (en) System and method for secure online authentication
US10360402B2 (en) Intercepting sensitive data using hashed candidates
CN105701423B (en) Date storage method and device applied to high in the clouds payment transaction
Kim et al. Attack detection application with attack tree for mobile system using log analysis
Baskaran et al. Measuring the leakage and exploitability of authentication secrets in super-apps: The wechat case
Mahmud et al. Cardpliance:{PCI}{DSS} compliance of android applications
Choudhary et al. Comparative analysis of mobile phishing detection and prevention approaches
Choi et al. Personal information leakage detection method using the inference-based access control model on the Android platform
Zhang et al. ScanMe mobile: a cloud-based Android malware analysis service
Ojugo et al. A social engineering detection model for the mobile smartphone clients
Lee et al. A study on realtime detecting smishing on cloud computing environments
Aparicio et al. App-based detection of vulnerable implementations of OTP SMS APIs in the banking sector
Ferreira Malicious URL detection using machine learning algorithms
Kim et al. A study on the digital forensic investigation method of clever malware in IoT devices
Rafsanjani et al. A evaluating security and privacy features of quick response code scanners: A comparative study
Shahriar et al. Mobile anti-phishing: Approaches and challenges
US12008105B2 (en) Protected QR code scanner using operational system override
CN107431693B (en) Message sender authenticity verification
KR20140112785A (en) Financial service system and method thereof, and apparatus applied to the same
Hutchinson et al. Forensic analysis of spy applications in android devices