A study on realtime detecting smishing on cloud computing environments

7Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Learning By smartphone developed, mobile malicious code will produce many new species of fraud technique that Smishing using a mobile malicious code was born. Damage of Smishing Because of the increase, against this possibility is urgent. In this paper, filtering, API analysis, bypass detection, in order to capture the sewing machine’s detection is performed. The proposed test method is performed directly in a virtualized environment, so you can also detect unknown malware, and that’s sewing machine can reduce the damage caused.

Cite

CITATION STYLE

APA

Lee, A., Kim, K., Lee, H., & Jun, M. (2016). A study on realtime detecting smishing on cloud computing environments. In Lecture Notes in Electrical Engineering (Vol. 354, pp. 495–501). Springer Verlag. https://doi.org/10.1007/978-3-662-47895-0_60

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free