Spear Phishing Simulation in Critical Sector: Telecommunication and Defense Sub-sector
暂无分享,去创建一个
[1] Vittorio Rosato,et al. Managing the Complexity of Critical Infrastructures: A Modelling and Simulation Approach , 2017 .
[2] Tracey Caldwell. Spear-phishing: how to spot and mitigate the menace , 2013 .
[3] Keyur Shah. PHISHING: AN EVOLVING THREAT , 2015 .
[4] Abhishek Singhal,et al. A literature survey on social engineering attacks: Phishing attack , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).
[5] Michael E. Locasto,et al. An interdiscplinary study of phishing and spear-phishing attacks , 2015 .
[6] Jason Bennett Thatcher,et al. Defending against Spear Phishing: Motivating Users through Fear appeal Manipulations , 2016, PACIS.
[7] Antesar M. Shabut,et al. A literature review on phishing crime, prevention review and investigation of gaps , 2016, 2016 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA).
[8] Zhenkai Liang,et al. Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity , 2017, IEEE Access.
[9] Alastair Nottingham,et al. Underlying finite state machine for the social engineering attack detection model , 2017, 2017 Information Security for South Africa (ISSA).
[10] Jason Earl Thomas. Individual Cyber Security: Empowering Employees to Resist Spear Phishing to Prevent Identity Theft and Ransomware Attacks , 2018 .
[11] Zinaida Benenson,et al. Unpacking Spear Phishing Susceptibility , 2017, Financial Cryptography Workshops.
[12] E. Anita,et al. A survey on data breach challenges in cloud computing security: Issues and threats , 2017, 2017 International Conference on Circuit ,Power and Computing Technologies (ICCPCT).
[13] Hein S. Venter,et al. Social engineering attack framework , 2014, 2014 Information Security for South Africa.
[14] Edgar R. Weippl,et al. Advanced social engineering attacks , 2015, J. Inf. Secur. Appl..
[15] Sanjay Goel,et al. Got Phished? Internet Security and Human Vulnerability , 2017, J. Assoc. Inf. Syst..