Journal articles on the topic 'Pretexting'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 19 journal articles for your research on the topic 'Pretexting.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mikhaleva, U. A. "Pretexting and means to counter it." Herald of Dagestan State Technical University. Technical Sciences 50, no. 2 (2023): 109–16. http://dx.doi.org/10.21822/2073-6185-2023-50-2-109-116.
Full textKhamdamova, L. K. "PROTECTION AGAINST PRETEXTING-TYPE SOCIAL ENGINEERING ATTACKS BY MEANS OF A SPEECH PATTERN DETECTION SYSTEM." DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES 11, no. 4 (2023): 128–32. http://dx.doi.org/10.25206/2310-9793-2023-11-4-128-132.
Full textPotthas, Christine, Patrick Berry, and Hamad Al-Naimi. "Social engineering." Advances in Engineering Innovation 2, no. 1 (2023): 22–25. http://dx.doi.org/10.54254/2977-3903/2/2023016.
Full textFreeman, Edward H. "Pretexting, Data Mining and Personal Privacy: The Gramm—Leach—Bliley Act." Information Systems Security 11, no. 2 (2002): 4–8. http://dx.doi.org/10.1201/1086/43320.11.2.20020501/36763.2.
Full textJin, Yan, and Christopher J. Kelsay. "Typology and dimensionality of litigation public relations strategies: The Hewlett-Packard board pretexting scandal case." Public Relations Review 34, no. 1 (2008): 66–69. http://dx.doi.org/10.1016/j.pubrev.2007.11.009.
Full textNaz, Anam, Madiha Sarwar, Muhammad Kaleem, Muhammad Azhar Mushtaq, and Salman Rashid. "A comprehensive survey on social engineering-based attacks on social networks." International Journal of ADVANCED AND APPLIED SCIENCES 11, no. 4 (2024): 139–54. http://dx.doi.org/10.21833/ijaas.2024.04.016.
Full textOlaniyi, Oluwaseun Oladeji, Christopher Uzoma Asonze, Samson Abidemi Ajayi, Samuel Oladiipo Olabanji, and Chinasa Susan Adigwe. "A Regressional Study on the Impact of Organizational Security Culture and Transformational Leadership on Social Engineering Awareness among Bank Employees: The Interplay of Security Education and Behavioral Change." Asian Journal of Economics, Business and Accounting 23, no. 23 (2023): 128–43. http://dx.doi.org/10.9734/ajeba/2023/v23i231176.
Full textKondo, Toshiaki, Sanami Nagao, Takashi Yanagishita, and Hideki Masuda. "Communication—Formation of Porous Anodic TiO2with Square Nanoholes by Pretexturing Process." Journal of The Electrochemical Society 163, no. 7 (2016): E206—E207. http://dx.doi.org/10.1149/2.1241607jes.
Full textMasuda, Hideki, Minoru Tajima, and Kazuyuki Nishio. "Site Control of Tunnel Etching of Al for Electrolytic Capacitors Using Pretexturing by Mold." Chemistry Letters 31, no. 11 (2002): 1150–51. http://dx.doi.org/10.1246/cl.2002.1150.
Full text"ANTHROPOLOGY OF PHONE FRAUD USING PRETEXTING: A CRIMINOLOGICAL STUDY." Monitoring of Law Enforcement, no. 2 (2023). http://dx.doi.org/10.21681/2226-0692-2023-2-32-38.
Full textЕ.В., Зотина,. "PRETEXTING AS A SOCIAL ENGINEERING TECHNIQUE USED BY TELEPHONE SCAMMERS: A CRIMINOLOGICAL VIEW OF THE PROBLEM." Вестник Казанского юридического института МВД России, no. 4(50) (January 10, 2023). http://dx.doi.org/10.37973/kui.2022.55.63.012.
Full textV.K., Vibhuti. "PREVENTION OF IDENTITY THEFT: AN ANALYSIS." JOURNAL OF UNIQUE LAWS AND STUDENTS I, no. I (2021). http://dx.doi.org/10.59126/v1i1a2.
Full textAhmed, Musa Midila. "Social Engineering Attacks in E-Government System: Detection and Prevention." International Journal of Applied Engineering and Management Letters, February 17, 2022, 100–116. http://dx.doi.org/10.47992/ijaeml.2581.7000.0123.
Full textTurki, Layla, Leena Khonji, and Magda Bayoumi. "An Exploratory Qualitative Study of Oncology Nurses’ Experience in Providing Care for Terminally Ill Patients in Salmaniya Medical Complex in Bahrain." Qualitative Report, May 8, 2023. http://dx.doi.org/10.46743/2160-3715/2023.5957.
Full textAzaabi, Cletus. "IMPROVING DIGITAL SECURITY AND PRIVACY OF STUDENTS IN COLLEGES OF EDUCATION: AN ATTITUDINAL CHANGE FRAMEWORK BASED ON COMPETENCE LEARNING MATRIX." European Journal of Education Studies 9, no. 10 (2022). http://dx.doi.org/10.46827/ejes.v9i10.4501.
Full textGanchenko, M. I. "Human psychological and biometric factor in the development and use of social engineering methods in peacetime and wartime." Modern Information Security 1, no. 49 (2022). http://dx.doi.org/10.31673/2409-7292.2022.011626.
Full text"Pretexturing a cathode sputtering target." Metal Finishing 96, no. 1 (1998): 99. http://dx.doi.org/10.1016/s0026-0576(97)80371-6.
Full text"Pretexturing a cathode sputtering target." Metal Finishing 96, no. 2 (1998): 111. http://dx.doi.org/10.1016/s0026-0576(97)82905-4.
Full textYanagishita, Takashi, Takuya Masuda, Toshiaki Kondo, and Hideki Masuda. "Highly ordered anodic porous oxides of transition metals fabricated by anodization combined with a pretexturing process." Electrochemistry Communications, January 2021, 106916. http://dx.doi.org/10.1016/j.elecom.2020.106916.
Full text