SmiDCA: Smishing attack detection for mobile computing on smishing dataset
Nowadays nearly everyone is using mobile computer/devices such as smart-phones and laptops to conduct their business transactions and for social purposes. While this trend has significantly transformed working and personal lifestyles worldwide, it has also led to serious concerns about threats to...
Saved in:
Main Author: | Hasan, Dahah Ahmed Haidarah |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | http://psasir.upm.edu.my/id/eprint/83849/1/FSKTM%202019%2015%20-%20IR.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Detection of wormhole attack in mobile ad-hoc networks
by: Sanaei, Mojtaba Ghanaatpisheh
Published: (2013) -
Attribute Set Weighting and Decomposition Approaches for Reduct Computation
by: Al-Radaideh, Qasem Ahmad
Published: (2005) -
Data mining techniques based on rough set theory /
by: Shen, Lixiang
Published: (2001) -
New Distance Measures for Arabic Handwritten Text Recognition
by: El-Bashir, Mohammad Said Mansur
Published: (2008) -
Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim
by: Ahmad Tarmizi Lim, Siti Naquiah
Published: (2016)