Social engineering attacks prevention: A systematic literature review
W Syafitri, Z Shukur, U Asma'Mokhtar… - IEEE …, 2022 - ieeexplore.ieee.org
Social engineering is an attack on information security for accessing systems or networks.
Social engineering attacks occur when victims do not recognize methods, models, and …
Social engineering attacks occur when victims do not recognize methods, models, and …
Cyber-aggression, cyberbullying, and cyber-grooming: A survey and research challenges
M Mladenović, V Ošmjanski, SV Stanković - ACM Computing Surveys …, 2021 - dl.acm.org
Cyber-aggression, cyberbullying, and cyber-grooming are distinctive and similar
phenomena that represent the objectionable content appearing on online social media …
phenomena that represent the objectionable content appearing on online social media …
Exploration of mobile device behavior for mitigating advanced persistent threats (APT): a systematic literature review and conceptual framework
T Jabar, M Mahinderjit Singh - Sensors, 2022 - mdpi.com
During the last several years, the Internet of Things (IoT), fog computing, computer security,
and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile …
and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile …
On the modeling of cyber-attacks associated with social engineering: A parental control prototype
P Zambrano, J Torres, L Tello-Oquendo… - Journal of Information …, 2023 - Elsevier
Nowadays, the psychological techniques used to harass, intimidate, threaten, steal
information are more common due to free access to technological resources and the …
information are more common due to free access to technological resources and the …
A human-centered systematic literature review of the computational approaches for online sexual risk detection
In the era of big data and artificial intelligence, online risk detection has become a popular
research topic. From detecting online harassment to the sexual predation of youth, the state …
research topic. From detecting online harassment to the sexual predation of youth, the state …
Online social deception and its countermeasures: A survey
We are living in an era when online communication over social network services (SNSs)
have become an indispensable part of people's everyday lives. As a consequence, online …
have become an indispensable part of people's everyday lives. As a consequence, online …
Impact of social engineering attacks: A literature review
W Fuertes, D Arévalo, JD Castro, M Ron… - … and Advances in …, 2022 - Springer
Social engineering is the practice, which allows attackers to obtain sensitive or confidential
information from a user of a system or organization, exploiting specific characteristics of the …
information from a user of a system or organization, exploiting specific characteristics of the …
'shishushurokkha': A transformative justice approach for combating child sexual abuse in bangladesh
The challenge of designing against child sexual abuse becomes more complicated in
conservative societies where talking about sex is tabooed. Our mix-method study, comprised …
conservative societies where talking about sex is tabooed. Our mix-method study, comprised …
Role of Artificial Intelligence in the Prevention of Online Child Sexual Abuse: A Systematic Review of Literature
S Singh, V Nambiar - Journal of Applied Security Research, 2024 - Taylor & Francis
Online Child sexual abuse (OCSA) is a major menace in the digitalized world. Every year,
more than a billion children between the ages of 2–17 years are sexually abused. Despite …
more than a billion children between the ages of 2–17 years are sexually abused. Despite …
An exploratory study of cognitive sciences applied to cybersecurity
Cognitive security is the interception between cognitive science and artificial intelligence
techniques used to protect institutions against cyberattacks. However, this field has not been …
techniques used to protect institutions against cyberattacks. However, this field has not been …