SmiDCA: Smishing attack detection for mobile computing on smishing dataset
Nowadays nearly everyone is using mobile computer/devices such as smart-phones and laptops to conduct their business transactions and for social purposes. While this trend has significantly transformed working and personal lifestyles worldwide, it has also led to serious concerns about threats to...
| Main Author: | Hasan, Dahah Ahmed Haidarah |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/83849/ http://psasir.upm.edu.my/id/eprint/83849/1/FSKTM%202019%2015%20-%20IR.pdf |
Similar Items
DCA for bot detection
by: Al-Hammadi, Yousof, et al.
Published: (2008)
by: Al-Hammadi, Yousof, et al.
Published: (2008)
Quantifying urban forest structure in Greater Manchester with open-access remote sensing datasets
by: Home, Philip
Published: (2022)
by: Home, Philip
Published: (2022)
Attribute Set Weighting and Decomposition Approaches for Reduct Computation
by: Al-Radaideh, Qasem Ahmad
Published: (2005)
by: Al-Radaideh, Qasem Ahmad
Published: (2005)
Framework for evaluating suitability of graphical user authentication for mobile banking
by: Kingsley Ugochukwu, Ejike Ekeke
Published: (2016)
by: Kingsley Ugochukwu, Ejike Ekeke
Published: (2016)
Achieving interoperability in mobility as a service: a data ecosystem leveraging Semantic Web Technologies
by: Essawy, Shams Khaled Elhosseny Ghazy
Published: (2024)
by: Essawy, Shams Khaled Elhosseny Ghazy
Published: (2024)
Mobile Robotics in a Random Finite Set Framework
by: Mullane, J., et al.
Published: (2014)
by: Mullane, J., et al.
Published: (2014)
New Distance Measures for Arabic Handwritten Text Recognition
by: El-Bashir, Mohammad Said Mansur
Published: (2008)
by: El-Bashir, Mohammad Said Mansur
Published: (2008)
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021)
by: Jamal, Fara
Published: (2021)
Detecting wormhole and Byzantine attacks in mobile ad hoc networks
by: Alam, Mohammad Rafiqul
Published: (2011)
by: Alam, Mohammad Rafiqul
Published: (2011)
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
by: Shaukat, Haafizah Rameeza
Published: (2014)
by: Shaukat, Haafizah Rameeza
Published: (2014)
Participant experiences of mobile device-based diary studies
by: Sun, Xu, et al.
Published: (2013)
by: Sun, Xu, et al.
Published: (2013)
Performance evaluation of DCA and SRC on a single bot detection
by: Al-Hammadi, Yousof, et al.
Published: (2010)
by: Al-Hammadi, Yousof, et al.
Published: (2010)
Rough sets for mining educational data
by: Johnson, J., et al.
Published: (2012)
by: Johnson, J., et al.
Published: (2012)
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016)
by: Hussein, Khalid Waleed
Published: (2016)
Leave recommender mobile application for supporting staff of UiTM Malacca Campus Jasin / Maizeaitul Nasira Mohamad Haris
by: Mohamad Haris, Maizeaitul Nasira
Published: (2015)
by: Mohamad Haris, Maizeaitul Nasira
Published: (2015)
Performance Modelling for Mobile Cellular Network Using Queueing System
by: Basi, Hussein Muzahim Aziz
Published: (1999)
by: Basi, Hussein Muzahim Aziz
Published: (1999)
Development of a Mobile Robot Spatial Data Acquisition System
by: Ooi, Wei Han
Published: (2006)
by: Ooi, Wei Han
Published: (2006)
Data caching framework and strategies for integrity constraint checking in mobile database system
by: Dzolkhifli, Zarina
Published: (2012)
by: Dzolkhifli, Zarina
Published: (2012)
Strengthening user authentication for better protection of mobile application systems
by: Mohamed, Kartini, et al.
Published: (2016)
by: Mohamed, Kartini, et al.
Published: (2016)
A relay attack for host-based card emulation (HCE) using NFC-enabled device for mobile payment
by: Che Hasan, Hafizah
Published: (2018)
by: Che Hasan, Hafizah
Published: (2018)
Towards a framework for the expansion of mobile computing in learning in Kuwaiti higher education: challenges and opportunities
by: Alturki, Abdullah
Published: (2017)
by: Alturki, Abdullah
Published: (2017)
Security against DoS attack in mobile IP communication
by: Parvin, S., et al.
Published: (2009)
by: Parvin, S., et al.
Published: (2009)
The effectiveness of DCA:summary and critiques of the literature review
by: Chen, Kun
Published: (2007)
by: Chen, Kun
Published: (2007)
Grey sets and greyness
by: Yang, Yingjie, et al.
Published: (2012)
by: Yang, Yingjie, et al.
Published: (2012)
Development of a heuristic procedure for balancing mixed-model parallel assembly line type II
by: Esmaeilian, Gholamreza
Published: (2010)
by: Esmaeilian, Gholamreza
Published: (2010)
Mobile and pervasive computing in construction: An introduction
by: Anumba, C., et al.
Published: (2012)
by: Anumba, C., et al.
Published: (2012)
An investigation into the application of active networks to mobile computing environments
by: Chin, Kwan-Wu
Published: (2000)
by: Chin, Kwan-Wu
Published: (2000)
Common Mobile Learning Characteristics-An Analysis Of Mobile Learning Models And Frameworks
by: Imtinan, Umera, et al.
Published: (2013)
by: Imtinan, Umera, et al.
Published: (2013)
Mobile Trainer Organizer Application
by: Armi Riffa, Mohamad Faiz, et al.
Published: (2020)
by: Armi Riffa, Mohamad Faiz, et al.
Published: (2020)
Anomaly-Based Detection Approach To Detect The Flash Crowd Attack During The Flash Event
by: Al-Saleem, Samer Abdulsada Mutlag
Published: (2017)
by: Al-Saleem, Samer Abdulsada Mutlag
Published: (2017)
Measuring water surface width at the national scale for England and Wales using remote sensing and statistical modelling
by: Clark, Liam D.
Published: (2019)
by: Clark, Liam D.
Published: (2019)
Factors affecting blind mobility
by: Clark-Carter, David
Published: (1985)
by: Clark-Carter, David
Published: (1985)
Babysitter Finder Mobile Application with Geofencing
by: Izul Murad, Siti Nursyazwani, et al.
Published: (2020)
by: Izul Murad, Siti Nursyazwani, et al.
Published: (2020)
Smart Catalogue Mobile Application (SCM) with Beacon Device
by: Odzaly, Edzreena Edza Binti, et al.
Published: (2020)
by: Odzaly, Edzreena Edza Binti, et al.
Published: (2020)
Korean Learning Mobile Application for UiTM Students
by: Rosland, Siti Nurqamarina, et al.
Published: (2020)
by: Rosland, Siti Nurqamarina, et al.
Published: (2020)
Usability evaluation framework for mobile apps
by: Rahmat, Hazwani
Published: (2020)
by: Rahmat, Hazwani
Published: (2020)
Addressing usability quality attribute in techno-spiritual mobile application
by: Abdul Wahab, Ahairul Afza
Published: (2015)
by: Abdul Wahab, Ahairul Afza
Published: (2015)
Towards using Interval-Valued responses in questionnaires through Fuzzy Set based techniques
by: Navarro Barron, Francisco Javier
Published: (2019)
by: Navarro Barron, Francisco Javier
Published: (2019)
Mobile Robot Localization Using Bar Codes as Artificial Landmarks
by: Ben-Hamid, Mahmud M. M.
Published: (2000)
by: Ben-Hamid, Mahmud M. M.
Published: (2000)
Determinant of customer intention to adopt mobile banking services in Sauda Arabia
by: Alsheikh, Layla Hodaed
Published: (2013)
by: Alsheikh, Layla Hodaed
Published: (2013)
Similar Items
-
DCA for bot detection
by: Al-Hammadi, Yousof, et al.
Published: (2008) -
Quantifying urban forest structure in Greater Manchester with open-access remote sensing datasets
by: Home, Philip
Published: (2022) -
Attribute Set Weighting and Decomposition Approaches for Reduct Computation
by: Al-Radaideh, Qasem Ahmad
Published: (2005) -
Framework for evaluating suitability of graphical user authentication for mobile banking
by: Kingsley Ugochukwu, Ejike Ekeke
Published: (2016) -
Achieving interoperability in mobility as a service: a data ecosystem leveraging Semantic Web Technologies
by: Essawy, Shams Khaled Elhosseny Ghazy
Published: (2024)