Learning By smartphone developed, mobile malicious code will produce many new species of fraud technique that Smishing using a mobile malicious code was born. Damage of Smishing Because of the increase, against this possibility is urgent. In this paper, filtering, API analysis, bypass detection, in order to capture the sewing machine’s detection is performed. The proposed test method is performed directly in a virtualized environment, so you can also detect unknown malware, and that’s sewing machine can reduce the damage caused.
CITATION STYLE
Lee, Kim, Lee, & Jun. (2016). Advanced Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, 354(January 2016), 495–501. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84947218626&partnerID=tZOtx3y1
Mendeley helps you to discover research relevant for your work.