Understanding and deciphering of social engineering attack scenarios

[1]  Jukka Vuorinen,et al.  Dissecting social engineering , 2013, Behav. Inf. Technol..

[2]  Pieter H. Hartel,et al.  On the anatomy of social engineering attacks—A literature‐based dissection of successful attacks , 2018 .

[3]  George Loukas,et al.  Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework , 2018, Comput. Secur..

[4]  John Mylopoulos,et al.  Secure-I*: Engineering Secure Software Systems through Social Analysis , 2009, Int. J. Softw. Informatics.

[5]  Jianmin Wang,et al.  Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG) , 2017, Inf. Softw. Technol..

[6]  R. Flynn,et al.  A Quarter-Century of Normalization and Social Role Valorization: Evolution and Impact , 1999 .

[7]  Hein S. Venter,et al.  Social engineering attack examples, templates and scenarios , 2016, Comput. Secur..

[8]  Sebastian Pape,et al.  Social engineering defence mechanisms and counteracting training strategies , 2017, Inf. Comput. Secur..

[9]  Raian Ali,et al.  Understanding Social Engineers Strategies from the Perspective of Sun-Tzu Philosophy , 2020, 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC).

[10]  Richard G. Brody,et al.  Flying under the radar: social engineering , 2012 .

[11]  Ho-Jin Choi,et al.  Preventing Social Engineering in Ubiquitous Environment , 2007, Future Generation Communication and Networking (FGCN 2007).

[12]  Konstantinos E. Psannis,et al.  Defending against phishing attacks: taxonomy of methods, current issues and future directions , 2017, Telecommunication Systems.

[13]  Rami Puzis,et al.  Detecting Organization-Targeted Socialbots by Monitoring Social Network Profiles , 2018 .

[14]  G. A. Chukwudebe,et al.  Mitigating social engineering for improved cybersecurity , 2015, 2015 International Conference on Cyberspace (CYBER-Abuja).

[15]  Edward Lank,et al.  A case study of using grounded analysis as a requirement engineering method: Identifying personas that specify privacy and security tool users , 2018, Sci. Comput. Program..

[16]  Hein S. Venter,et al.  Necessity for ethics in social engineering research , 2015, Comput. Secur..

[17]  Feng Yu,et al.  A Content-Based Phishing Email Detection Method , 2017, 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).

[18]  Tim Thornburgh Social engineering: the "Dark Art" , 2004, InfoSecCD '04.

[19]  George R. S. Weir,et al.  A Semi-automated Security Advisory System to Resist Cyber-Attack in Social Networks , 2018, ICCCI.

[20]  Robert Biddle,et al.  The Role of Instructional Design in Persuasion: A Comics Approach for Improving Cybersecurity , 2016, Int. J. Hum. Comput. Interact..

[21]  Lin Liu,et al.  Contemplating social engineering studies and attack scenarios: A review study , 2019, Secur. Priv..

[22]  Edgar R. Weippl,et al.  Advanced social engineering attacks , 2015, J. Inf. Secur. Appl..

[23]  Steve Love,et al.  A game design framework for avoiding phishing attacks , 2013, Comput. Hum. Behav..

[24]  Douglas P. Twitchell Social Engineering and its Countermeasures , 2009 .

[25]  Jianmin Wang,et al.  Improving software security awareness using a serious game , 2019, IET Softw..

[26]  Joseph M. Hatfield Social engineering in cybersecurity: The evolution of a concept , 2018, Comput. Secur..

[27]  Chauncey Wilson CHAPTER 4 – Brainstorming , 2010 .

[28]  Aidan F. Browne,et al.  Survey of Non-malicious User Actions that Introduce Network and System Vulnerabilities and Exploits , 2018, SoutheastCon 2018.

[29]  Affan Yasin,et al.  How persuasive is a phishing email? A phishing game for phishing awareness , 2019, J. Comput. Secur..