Learning By smartphone developed, mobile malicious code will produce many new species of fraud technique that Smishing using a mobile malicious code was born. Damage of Smishing Because of the increase, against this possibility is urgent. In this paper, filtering, API analysis, bypass detection, in order to capture the sewing machine’s detection is performed. The proposed test method is performed directly in a virtualized environment, so you can also detect unknown malware, and that’s sewing machine can reduce the damage caused.
CITATION STYLE
Lee, A., Kim, K., Lee, H., & Jun, M. (2016). A study on realtime detecting smishing on cloud computing environments. In Lecture Notes in Electrical Engineering (Vol. 354, pp. 495–501). Springer Verlag. https://doi.org/10.1007/978-3-662-47895-0_60
Mendeley helps you to discover research relevant for your work.