A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Securing UAV flying base station for mobile networking: A review

SY Chang, K Park, J Kim, J Kim - Future Internet, 2023 - mdpi.com
A flying base station based on an unmanned aerial vehicle (UAV) uses its mobility to extend
its connectivity coverage and improve its communication channel quality to achieve a …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Users really do respond to smishing

ML Rahman, D Timko, H Wali, A Neupane - Proceedings of the …, 2023 - dl.acm.org
Text phish messages, referred to as Smishing (SMS+ phishing) is a type of social
engineering attack where fake text messages are created, and used to lure users into …

Clues in tweets: Twitter-guided discovery and analysis of SMS spam

S Tang, X Mi, Y Li, XF Wang, K Chen - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
With its critical role in business and service delivery through mobile devices, SMS (Short
Message Service) has long been abused for spamming, which is still on the rise today …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

PSC-BERT: A spam identification and classification algorithm via prompt learning and spell check

J Gui, Y Zhou, K Yu, X Wu - Knowledge-Based Systems, 2024 - Elsevier
The rapid growth of the Internet has led to an increase in spam activities, posing significant
security threats. Spammers use various tactics, such as intentional misspellings, to evade …

Detecting and characterizing SMS spearphishing attacks

M Liu, Y Zhang, B Liu, Z Li, H Duan, D Sun - Proceedings of the 37th …, 2021 - dl.acm.org
Although spearphishing is a well-known security issue and has been widely researched, it is
still an evolving threat with emerging forms. In recent years, Short Message Service (SMS) …

[PDF][PDF] Thwarting Smartphone SMS Attacks at the Radio Interface Layer.

H Wen, PA Porras, V Yegneswaran, Z Lin - NDSS, 2023 - ndss-symposium.org
The short message service (SMS) is a cornerstone of modern smartphone communication
that enables inter-personal text messaging and other SMS-based services (eg, two-factor …

{CellDAM}:{User-Space}, Rootless Detection and Mitigation for 5G Data Plane

Z Tan, J Zhao, B Ding, S Lu - 20th USENIX Symposium on Networked …, 2023 - usenix.org
Despite all deployed security fences in 5G, attacks against its data plane are still feasible. A
smart attacker can fabricate data packets or intelligently forge/drop/modify data-plane …