2021
DOI: 10.11591/ijai.v10.i3.pp519-527
|View full text |Cite
|
Sign up to set email alerts
|

Boyer Moore string-match framework for a hybrid short message service spam filtering technique

Abstract: Advances in technology and the proliferation of mobile device have continued to advance the ubiquitous nature of computing alongside their many prowess and improved features it brings as a disruptive technology to aid information sharing amongst many online users. This popularity, usage and adoption ease, mobility, and portability of the mobile smartphone devices have allowed for its acceptability and popularity. Mobile smartphones continue to adopt the use of short messages services accompanied with a scenari… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(18 citation statements)
references
References 29 publications
0
11
0
Order By: Relevance
“…Several studies to enhance information-rich supply value chains have led to advances in mathematical modeling, information management, supply chain management strategies, data mining, etc. These were implemented via tech-rich and tech-dependent structures such as virtualization, the internet of things (IoT), radio frequency identifications (RFIDs), and in recent times, the use of blockchain [5], [6]. In Nigeria, agriculture has since become the primary source of livelihood for many of its citizens.…”
Section: Literature Review 21 the Information-rich Supply Value Chainmentioning
confidence: 99%
See 1 more Smart Citation
“…Several studies to enhance information-rich supply value chains have led to advances in mathematical modeling, information management, supply chain management strategies, data mining, etc. These were implemented via tech-rich and tech-dependent structures such as virtualization, the internet of things (IoT), radio frequency identifications (RFIDs), and in recent times, the use of blockchain [5], [6]. In Nigeria, agriculture has since become the primary source of livelihood for many of its citizens.…”
Section: Literature Review 21 the Information-rich Supply Value Chainmentioning
confidence: 99%
“…Here, a node is referred to as a computing device (physical or virtual) that is part of the blockchain network. Its benefits are poised from the inherent characteristics and feature it possesses such as security, decentralization, smart contracts and portfolios, and auditability [3], [6], [10].…”
Section: The Block-chain Network and Modelmentioning
confidence: 99%
“…Socially-engineered attacks use technical subterfuge to defraud a victim of their data by posing as a trusted identity. The messages (also called spam) involve harmless advertising via unsolicited emails, SMS, or network messages, and contain mechanisms to exploit recipient data [7], [8]. The adoption of spam is due to its low-volume-and-high-value target successes, and distribution ease [9].…”
Section: Literature Review 21 An Overview Of Phishingmentioning
confidence: 99%
“…Socially-engineered attacks (e.g., spam) often involve harmless advertising via unsolicited emails/short message service (SMS) as network messages. They may contain viruses designed to retrieve a user's personal data [7], [8]. The nature of spam is such that they are structured as a target mechanism for high-value victims and sent out to target high-volume unsuspecting victims besides distribution ease [9].…”
Section: Introductionmentioning
confidence: 99%