{"id":"https://openalex.org/W2974087340","doi":"https://doi.org/10.1109/ic3.2019.8844920","title":"SMS Phishing and Mitigation Approaches","display_name":"SMS Phishing and Mitigation Approaches","publication_year":2019,"publication_date":"2019-08-01","ids":{"openalex":"https://openalex.org/W2974087340","doi":"https://doi.org/10.1109/ic3.2019.8844920","mag":"2974087340"},"language":"en","primary_location":{"id":"doi:10.1109/ic3.2019.8844920","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3.2019.8844920","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Twelfth International Conference on Contemporary Computing (IC3)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044872470","display_name":"Sandhya Mishra","orcid":"https://orcid.org/0000-0001-9409-8587"},"institutions":[{"id":"https://openalex.org/I154970844","display_name":"Jaypee Institute of Information Technology","ror":"https://ror.org/05sttyy11","country_code":"IN","type":"education","lineage":["https://openalex.org/I154970844"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sandhya Mishra","raw_affiliation_strings":["Department of Computer Science and Engineering, Jaypee Institute of Information Technology, Noida, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Jaypee Institute of Information Technology, Noida, India","institution_ids":["https://openalex.org/I154970844"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069086313","display_name":"Devpriya Soni","orcid":"https://orcid.org/0000-0001-5589-5962"},"institutions":[{"id":"https://openalex.org/I154970844","display_name":"Jaypee Institute of Information Technology","ror":"https://ror.org/05sttyy11","country_code":"IN","type":"education","lineage":["https://openalex.org/I154970844"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Devpriya Soni","raw_affiliation_strings":["Department of Computer Science and Engineering, Jaypee Institute of Information Technology, Noida, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Jaypee Institute of Information Technology, Noida, India","institution_ids":["https://openalex.org/I154970844"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5044872470"],"corresponding_institution_ids":["https://openalex.org/I154970844"],"apc_list":null,"apc_paid":null,"fwci":5.0871,"has_fulltext":false,"cited_by_count":39,"citation_normalized_percentile":{"value":0.95763593,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7606141567230225},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.7466955184936523},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.7355355620384216},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6862195730209351},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.590861976146698},{"id":"https://openalex.org/keywords/mobile-phone","display_name":"Mobile phone","score":0.53507399559021},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5284007787704468},{"id":"https://openalex.org/keywords/installation","display_name":"Installation","score":0.4892301559448242},{"id":"https://openalex.org/keywords/credit-card","display_name":"Credit card","score":0.4870658218860626},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3914220929145813},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.35164257884025574},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.23329228162765503},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.101199209690094},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10088813304901123}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7606141567230225},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.7466955184936523},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.7355355620384216},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6862195730209351},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.590861976146698},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.53507399559021},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5284007787704468},{"id":"https://openalex.org/C146778888","wikidata":"https://www.wikidata.org/wiki/Q836862","display_name":"Installation","level":2,"score":0.4892301559448242},{"id":"https://openalex.org/C2983355114","wikidata":"https://www.wikidata.org/wiki/Q161380","display_name":"Credit card","level":3,"score":0.4870658218860626},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3914220929145813},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.35164257884025574},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.23329228162765503},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.101199209690094},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10088813304901123},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3.2019.8844920","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3.2019.8844920","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Twelfth International Conference on Contemporary Computing (IC3)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W336973054","https://openalex.org/W1550099438","https://openalex.org/W2067631668","https://openalex.org/W2410824883","https://openalex.org/W2576815293","https://openalex.org/W2780954022","https://openalex.org/W2783922631","https://openalex.org/W2801332331","https://openalex.org/W2806109533","https://openalex.org/W2921477761","https://openalex.org/W3013020911","https://openalex.org/W6714845088","https://openalex.org/W6751948902"],"related_works":["https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W2482950156","https://openalex.org/W3042334625","https://openalex.org/W3139248031","https://openalex.org/W4200017362","https://openalex.org/W2305322260","https://openalex.org/W2118123121","https://openalex.org/W4388020458"],"abstract_inverted_index":{"Smishing":[0],"is":[1],"an":[2,124],"attack":[3],"targeted":[4],"to":[5,23,30,57,98,105,135,147,179,184],"mobile":[6,81,186],"devices":[7],"in":[8,71,112,132,157],"which":[9,91],"the":[10,24,27,52,55,60,64,72,96,100,154,158,180],"attacker":[11,28,53],"sends":[12],"text":[13],"messages":[14,117,138],"containing":[15],"malicious":[16],"links,":[17],"phone":[18,65],"numbers":[19],"or":[20,62,67],"E-Mail":[21],"IDs":[22],"victim":[25],"and":[26,114,162,165],"aims":[29],"steal":[31],"sensitive":[32],"user":[33,40,56,97,169],"data":[34],"like":[35],"bank":[36],"account":[37],"details,":[38,44],"passwords,":[39],"credentials,":[41],"credit":[42],"card":[43],"etc":[45],"through":[46],"this":[47,50,75,133,172],"message.":[48],"Through":[49],"message,":[51],"prompts":[54],"click":[58],"on":[59,153,182],"link":[61],"contact":[63],"number":[66],"E-mail":[68],"ID":[69],"provided":[70,156],"SMS.":[73],"In":[74,103],"paper,":[76],"we":[77,122],"have":[78,85],"discussed":[79],"various":[80,88,107],"smishing":[82,101,116,137,187],"attacks.":[83,102,188],"We":[84],"also":[86,119],"suggested":[87],"best":[89],"policies":[90],"can":[92],"be":[93,148,175],"followed":[94],"by":[95,129],"mitigate":[99],"addition":[104],"this,":[106],"techniques":[108],"that":[109],"are":[110,118],"useful":[111],"mitigating":[113],"identifying":[115],"discussed.":[120],"Finally,":[121],"gave":[123],"overview":[125],"of":[126],"methodologies":[127],"proposed":[128],"other":[130],"researchers":[131],"field":[134],"differentiate":[136],"from":[139],"legitimate":[140],"ones.":[141],"This":[142],"paper":[143,173],"would":[144,174],"enable":[145],"users":[146],"more":[149],"careful":[150],"while":[151],"clicking":[152],"links":[155],"SMS":[159],"for":[160],"downloading":[161],"installing":[163],"apps":[164],"filling":[166],"up":[167],"fake":[168],"interfaces.":[170],"Also,":[171],"a":[176],"great":[177],"contribution":[178],"study":[181],"how":[183],"identify":[185]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
