Detection of Social Engineering Attacks Through Natural Language Processing of Conversations
暂无分享,去创建一个
Ian G. Harris | Ram Bhakta | Yuki Sawa | Christopher Hadnagy | Christopher Hadnagy | I. Harris | Ram Bhakta | Yuki Sawa
[1] Beatrice Santorini,et al. Building a Large Annotated Corpus of English: The Penn Treebank , 1993, CL.
[2] Jerry R. Hobbs. Resolving pronoun references , 1986 .
[3] D. Gragg. A Multi-Level Defense Against Social Engineering , 2003 .
[4] Csr Young,et al. How to Do Things With Words , 2009 .
[5] Christopher Hadnagy,et al. Unmasking the Social Engineer: The Human Element of Security , 2014 .
[6] Ian G. Harris,et al. Semantic analysis of dialogs to detect social engineering attacks , 2015, Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015).
[7] William L. Simon,et al. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers , 2005 .
[8] A. Koller,et al. Speech Acts: An Essay in the Philosophy of Language , 1969 .
[9] Hein S. Venter,et al. Social engineering attack detection model: SEADM , 2010, 2010 Information Security for South Africa.
[10] Christopher Hadnagy,et al. Social Engineering: The Art of Human Hacking , 2010 .
[11] Jon M. Kleinberg,et al. Echoes of power: language effects and power differences in social interaction , 2011, WWW.
[12] Roger Levy,et al. Tregex and Tsurgeon: tools for querying and manipulating tree data structures , 2006, LREC.
[13] Jamison W Scheeres. Establishing the Human Firewall: Reducing an Individual's Vulnerability to Social Engineering Attacks , 2012 .
[14] Dan Klein,et al. Accurate Unlexicalized Parsing , 2003, ACL.