Understanding and deciphering of social engineering attack scenarios
暂无分享,去创建一个
Affan Yasin | Rubia Fatima | Raian Ali | Ziqi Wei | Lin Liu | Jianmin Wang | Lin Liu | Jianmin Wang | Affan Yasin | R. Fatima | Raian Ali | Ziqi Wei
[1] Jukka Vuorinen,et al. Dissecting social engineering , 2013, Behav. Inf. Technol..
[2] Pieter H. Hartel,et al. On the anatomy of social engineering attacks—A literature‐based dissection of successful attacks , 2018 .
[3] George Loukas,et al. Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework , 2018, Comput. Secur..
[4] John Mylopoulos,et al. Secure-I*: Engineering Secure Software Systems through Social Analysis , 2009, Int. J. Softw. Informatics.
[5] Jianmin Wang,et al. Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG) , 2017, Inf. Softw. Technol..
[6] R. Flynn,et al. A Quarter-Century of Normalization and Social Role Valorization: Evolution and Impact , 1999 .
[7] Hein S. Venter,et al. Social engineering attack examples, templates and scenarios , 2016, Comput. Secur..
[8] Sebastian Pape,et al. Social engineering defence mechanisms and counteracting training strategies , 2017, Inf. Comput. Secur..
[9] Raian Ali,et al. Understanding Social Engineers Strategies from the Perspective of Sun-Tzu Philosophy , 2020, 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC).
[10] Richard G. Brody,et al. Flying under the radar: social engineering , 2012 .
[11] Ho-Jin Choi,et al. Preventing Social Engineering in Ubiquitous Environment , 2007, Future Generation Communication and Networking (FGCN 2007).
[12] Konstantinos E. Psannis,et al. Defending against phishing attacks: taxonomy of methods, current issues and future directions , 2017, Telecommunication Systems.
[13] Rami Puzis,et al. Detecting Organization-Targeted Socialbots by Monitoring Social Network Profiles , 2018 .
[14] G. A. Chukwudebe,et al. Mitigating social engineering for improved cybersecurity , 2015, 2015 International Conference on Cyberspace (CYBER-Abuja).
[15] Edward Lank,et al. A case study of using grounded analysis as a requirement engineering method: Identifying personas that specify privacy and security tool users , 2018, Sci. Comput. Program..
[16] Hein S. Venter,et al. Necessity for ethics in social engineering research , 2015, Comput. Secur..
[17] Feng Yu,et al. A Content-Based Phishing Email Detection Method , 2017, 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).
[18] Tim Thornburgh. Social engineering: the "Dark Art" , 2004, InfoSecCD '04.
[19] George R. S. Weir,et al. A Semi-automated Security Advisory System to Resist Cyber-Attack in Social Networks , 2018, ICCCI.
[20] Robert Biddle,et al. The Role of Instructional Design in Persuasion: A Comics Approach for Improving Cybersecurity , 2016, Int. J. Hum. Comput. Interact..
[21] Lin Liu,et al. Contemplating social engineering studies and attack scenarios: A review study , 2019, Secur. Priv..
[22] Edgar R. Weippl,et al. Advanced social engineering attacks , 2015, J. Inf. Secur. Appl..
[23] Steve Love,et al. A game design framework for avoiding phishing attacks , 2013, Comput. Hum. Behav..
[24] Douglas P. Twitchell. Social Engineering and its Countermeasures , 2009 .
[25] Jianmin Wang,et al. Improving software security awareness using a serious game , 2019, IET Softw..
[26] Joseph M. Hatfield. Social engineering in cybersecurity: The evolution of a concept , 2018, Comput. Secur..
[27] Chauncey Wilson. CHAPTER 4 – Brainstorming , 2010 .
[28] Aidan F. Browne,et al. Survey of Non-malicious User Actions that Introduce Network and System Vulnerabilities and Exploits , 2018, SoutheastCon 2018.
[29] Affan Yasin,et al. How persuasive is a phishing email? A phishing game for phishing awareness , 2019, J. Comput. Secur..