Analysis of Social Engineering Attacks Using Exploit Kits
暂无分享,去创建一个
[1] Naima Kaabouch,et al. Social Engineering Attacks: A Survey , 2019, Future Internet.
[2] Dong Xu,et al. Forward-Looking Element Recognition Based on the LSTM-CRF Model with the Integrity Algorithm , 2019, Future Internet.
[3] Bin Wu,et al. A Session and Dialogue-Based Social Engineering Framework , 2019, IEEE Access.
[4] Ciza Thomas,et al. A static approach to detect drive-by-download attacks on webpages , 2013, 2013 International Conference on Control Communication and Computing (ICCC).
[5] Fabio Massacci,et al. Anatomy of Exploit Kits - Preliminary Analysis of Exploit Kits as Software Artefacts , 2013, ESSoS.
[6] Vinod Yegneswaran,et al. BLADE: an attack-agnostic approach for preventing drive-by malware infections , 2010, CCS '10.
[7] Michael Lardschneider,et al. Social Engineering , 2008, Datenschutz und Datensicherheit - DuD.
[8] W. Tolman,et al. Social Engineering , 2014, Encyclopedia of Social Network Analysis and Mining.