Analysis of Social Engineering Attacks Using Exploit Kits

[1]  Naima Kaabouch,et al.  Social Engineering Attacks: A Survey , 2019, Future Internet.

[2]  Dong Xu,et al.  Forward-Looking Element Recognition Based on the LSTM-CRF Model with the Integrity Algorithm , 2019, Future Internet.

[3]  Bin Wu,et al.  A Session and Dialogue-Based Social Engineering Framework , 2019, IEEE Access.

[4]  Ciza Thomas,et al.  A static approach to detect drive-by-download attacks on webpages , 2013, 2013 International Conference on Control Communication and Computing (ICCC).

[5]  Fabio Massacci,et al.  Anatomy of Exploit Kits - Preliminary Analysis of Exploit Kits as Software Artefacts , 2013, ESSoS.

[6]  Vinod Yegneswaran,et al.  BLADE: an attack-agnostic approach for preventing drive-by malware infections , 2010, CCS '10.

[7]  Michael Lardschneider,et al.  Social Engineering , 2008, Datenschutz und Datensicherheit - DuD.

[8]  W. Tolman,et al.  Social Engineering , 2014, Encyclopedia of Social Network Analysis and Mining.