Social engineering attacks: A survey
F Salahdine, N Kaabouch - Future internet, 2019 - mdpi.com
The advancements in digital communication technology have made communication
between humans more accessible and instant. However, personal and sensitive information …
between humans more accessible and instant. However, personal and sensitive information …
A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks
R Heartfield, G Loukas - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Social engineering is used as an umbrella term for a broad spectrum of computer
exploitations that employ a variety of attack vectors and strategies to psychologically …
exploitations that employ a variety of attack vectors and strategies to psychologically …
Advanced social engineering attacks
Social engineering has emerged as a serious threat in virtual communities and is an
effective means to attack information systems. The services used by today's knowledge …
effective means to attack information systems. The services used by today's knowledge …
Social engineering attack examples, templates and scenarios
The field of information security is a fast-growing discipline. Even though the effectiveness of
security measures to protect sensitive information is increasing, people remain susceptible …
security measures to protect sensitive information is increasing, people remain susceptible …
Defining social engineering in cybersecurity
Social engineering has posed a serious security threat to infrastructure, user, data and
operations of cyberspace. Nevertheless, there are many conceptual deficiencies (such as …
operations of cyberspace. Nevertheless, there are many conceptual deficiencies (such as …
User characteristics that influence judgment of social engineering attacks in social networks
SM Albladi, GRS Weir - Human-centric Computing and Information …, 2018 - Springer
Social engineering is a growing source of information security concern. Exploits appear to
evolve, with increasing levels of sophistication, in order to target multiple victims. Despite …
evolve, with increasing levels of sophistication, in order to target multiple victims. Despite …
Social engineering attack framework
The field of information security is a fast growing discipline. Even though the effectiveness of
security measures to protect sensitive information is increasing, people remain susceptible …
security measures to protect sensitive information is increasing, people remain susceptible …
Social engineering in cybersecurity: a domain ontology and knowledge graph application examples
Social engineering has posed a serious threat to cyberspace security. To protect against
social engineering attacks, a fundamental work is to know what constitutes social …
social engineering attacks, a fundamental work is to know what constitutes social …
Towards an ontological model defining the social engineering domain
The human is often the weak link in the attainment of Information Security due to their
susceptibility to deception and manipulation. Social Engineering refers to the exploitation of …
susceptibility to deception and manipulation. Social Engineering refers to the exploitation of …
Taxonomy of mobile users' security awareness
The popularity of smartphones, coupled with the amount of valuable and private information
they hold, make them attractive to attackers interested in exploiting the devices to harvest …
they hold, make them attractive to attackers interested in exploiting the devices to harvest …