Phishing environments, techniques, and countermeasures: A survey

A Aleroud, L Zhou - Computers & Security, 2017 - Elsevier
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …

Mobile phishing attacks and defence mechanisms: State of art and open research challenges

D Goel, AK Jain - computers & security, 2018 - Elsevier
Phishing is an online identity theft in which an attacker tries to steal user's personal
information, resulting in financial loss of individuals as well as organisations. Nowadays …

Bypassing detection of URL-based phishing attacks using generative adversarial deep neural networks

A AlEroud, G Karabatis - Proceedings of the sixth international workshop …, 2020 - dl.acm.org
The URL components of web addresses are frequently used in creating phishing detection
techniques. Typically, machine learning techniques are widely used to identify anomalous …

A survey on smartphones security: software vulnerabilities, malware, and attacks

MT Ahvanooey, Q Li, M Rabbani, AR Rajput - arXiv preprint arXiv …, 2020 - arxiv.org
Nowadays, the usage of smartphones and their applications have become rapidly
increasing popular in people's daily life. Over the last decade, availability of mobile money …

Authentication systems: A literature review and classification

MH Barkadehi, M Nilashi, O Ibrahim, AZ Fardi… - Telematics and …, 2018 - Elsevier
One of the most important parts of any system is authentication. Appreciated as the first and
the last line of defense in the great majority of cases, authentication systems can usually …

Distributed ledger technologies for authentication and access control in networking applications: A comprehensive survey

F Ghaffari, E Bertin, N Crespi, J Hatin - Computer Science Review, 2023 - Elsevier
The accelerated growth of networking technologies highlights the importance of
Authentication and Access Control (AAC) as protection against associated attacks …

Security threats of wireless networks: A survey

A Gupta, RK Jha - International Conference on Computing …, 2015 - ieeexplore.ieee.org
Security will play an important role in wireless networks. In the present scenario, 3G and 4G
networks have separate security layers but still there is a possibility of certain prominent …

An efficient mCK signing and mobile based identity solution for authentication

KK Kamal, S Gupta, P Joshi, M Kapoor - International Journal of …, 2023 - Springer
With the growing spread of mobile devices, many services are accessed using such devices
and hence there is a need to have an authentication mechanism for mobile-based …

A secure end‐to‐end SMS‐based mobile banking protocol

S Bojjagani, VN Sastry - International journal of communication …, 2017 - Wiley Online Library
Short message service (SMS) provides a wide channel of communication for banking in
mobile commerce and mobile payment. The transmission of SMS is not secure in the …

Duty-cycle-based controlled physical unclonable function

MJ Azhar, F Amsaad, S Köse - IEEE Transactions on Very …, 2018 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) provide a unique signature based on the variations
during the fabrication process of the integrated circuits. The additional features of …