Academic literature on the topic 'Social engineering attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Social engineering attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Social engineering attacks"
Shi, Zheyuan Ryan, Aaron Schlenker, Brian Hay, Daniel Bittleston, Siyu Gao, Emily Peterson, John Trezza, and Fei Fang. "Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 08 (April 3, 2020): 13363–68. http://dx.doi.org/10.1609/aaai.v34i08.7050.
Full textLuo, Xin, Richard Brody, Alessandro Seazzu, and Stephen Burd. "Social Engineering." Information Resources Management Journal 24, no. 3 (July 2011): 1–8. http://dx.doi.org/10.4018/irmj.2011070101.
Full textSalahdine, Fatima, and Naima Kaabouch. "Social Engineering Attacks: A Survey." Future Internet 11, no. 4 (April 2, 2019): 89. http://dx.doi.org/10.3390/fi11040089.
Full textKrombholz, Katharina, Heidelinde Hobel, Markus Huber, and Edgar Weippl. "Advanced social engineering attacks." Journal of Information Security and Applications 22 (June 2015): 113–22. http://dx.doi.org/10.1016/j.jisa.2014.09.005.
Full textYe, Ziwei, Yuanbo Guo, Ankang Ju, Fushan Wei, Ruijie Zhang, and Jun Ma. "A Risk Analysis Framework for Social Engineering Attack Based on User Profiling." Journal of Organizational and End User Computing 32, no. 3 (July 2020): 37–49. http://dx.doi.org/10.4018/joeuc.2020070104.
Full textBeckers, Kristian, Leanid Krautsevich, and Artsiom Yautsiukhin. "Using Attack Graphs to Analyze Social Engineering Threats." International Journal of Secure Software Engineering 6, no. 2 (April 2015): 47–69. http://dx.doi.org/10.4018/ijsse.2015040103.
Full textAlhamad, Amal, Dalal Aldablan, and Raghad Albahlal. "Examination of Assorted Social Engineering Attack by Different Types of Machine Learning Algorithms." International Journal of Computer Science and Mobile Computing 10, no. 7 (July 30, 2021): 56–60. http://dx.doi.org/10.47760/ijcsmc.2021.v10i07.008.
Full textVLAD, Ionela-Mariana. "Security of Personal Data in Social Networks." International Journal of Information Security and Cybercrime 7, no. 2 (December 29, 2018): 14–24. http://dx.doi.org/10.19107/ijisc.2018.02.02.
Full textAldawood, Hussain, and Geoffrey Skinner. "An Advanced Taxonomy for Social Engineering Attacks." International Journal of Computer Applications 177, no. 30 (January 16, 2020): 1–11. http://dx.doi.org/10.5120/ijca2020919744.
Full textSarriegi, Jose M., and Jose J. Gonzalez. "Conceptualising social engineering attacks through system archetypes." International Journal of System of Systems Engineering 1, no. 1/2 (2008): 111. http://dx.doi.org/10.1504/ijsse.2008.018134.
Full textDissertations / Theses on the topic "Social engineering attacks"
Cerovic, Lazar. "Identifying Resilience Against Social Engineering Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280131.
Full textSociala manipulationer är bland de vanligaste cyber attackerna och bedrägerierna som orsakar enorma ekonomiska skador varje år för individer, företag och myndigheter. Dessa attacker är svåra att skydda ifrån då sociala manipulationer utnyttjar mänskliga svagheter som ett medel till att stjäla pengar eller information. Målet med studien är att identifiera indikatorer av motstånd mot sociala manipulationsattacker, vilket ska göras med hjälp av individuell data, som kan bestå av nätverksinställningar, sociala medieprofiler, webbaktivitet bland annat. Denna studie är baserat på kvalitativa metoder för att samla, analysera och utvärdera data. Motstånd mot social manipulation utvärderas med hjälp av relevanta teorier och modeller som har med beteende och personligheter att göra, sedan används även personlig och demografisk information i utvärderingen. De indikatorer som identifierades var bland annat inställningar i routrar, webbhistorik och social medianvändning. Det teoretiska ramverket som utvecklades för att utvärdera motstånd mot sociala manipulationsattacker kan utökas med fler aspekter av individuell data. Viktiga samhällshändelser och sammanhang kan vara en intressant faktor som är relaterat till ämnet. Framtida studier skulle kunna kombinera detta ramverk med tekniker som maskinlärning och artificiell intelligens.
Jansson, Kenny. "A model for cultivating resistance to social engineering attacks." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1588.
Full textRocha, Flores Waldo. "Shaping information security behaviors related to social engineering attacks." Doctoral thesis, KTH, Elkraftteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186113.
Full textQC 20160503
Nohlberg, Marcus. "Securing Information Assets : Understanding, Measuring and Protecting against Social Engineering Attacks." Doctoral thesis, Kista : Department of Computer and Systems Sciences (together with KTH), Stockholm University, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-8379.
Full textCarlander-Reuterfelt, Gallo Matias. "Estimating human resilience to social engineering attacks through computer configuration data : A literature study on the state of social engineering vulnerabilities." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277921.
Full textSocial Manipulering som attackmetod har blivit ett ökande problem både för företag och individer. Från identitetsstöld till enorma ekonomiska förluster, är denna form av attack känd för att kunna påverka komplexa system, men är ofta i sig mycket enkel i sin form. Medans andra typer av cyberattacker kan skyddas med verktyg som antivirus och antimalware och tillförlitligt hålla privat och konfidentiell information säker så finns det inga motsvarande verktyg för att skydda sig mot Social Manipulering attacker. Det finns alltså inte idag ett pålitligt och säkert sätt att motstå Social Manipulering attacker och skydda personliga uppgifter och privat data. Syftet med denna rapport är att visa olika aspekterna hur datoranvändares data är sårbarhet för dessa typer av attacker, och med dessa utforma ett system som med viss mån av precision kan mäta resiliens mot Social Manipulering. Rapporten är ett resultat av studier av litteratur inom ämnet Social Manipulering och hur den relaterar sig till datorns data, konfiguration och personuppgifter. De olika delarna av utredningen leder var och en till ett mer omfattande sätt att koppla samman de olika uppgifterna och utforma ett rudimentärt sätt att uppskatta en persons resiliens mot Social Manipulering, detta genom att observera olika aspekter av datorns konfiguration. För syftet av rapporten så har uppgifterna varit rimligt tillgängliga, har respekterat integriteten och varit något som lätt kan anpassas från en användare till en annan. Baserat på observationerna av psykologiska data, beteendemönster och nätverkskonfigurationer, så kan vi dra slutsatsen att även om det finns data som stöder möjligheten att uppskatta resiliens, finns det idag inget empiriskt bevisat sätt att göra det på ett exakt sätt. En exempel av modell för att uppskatta resiliens finns i slutet av rapporten. Ramen för detta projekt gjorde det inte möjligt att göra ett praktiskt experiment för att validera teorierna.
Persson, Anders. "Exploring Phishing Attacks and Countermeasures." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3620.
Full textNordgren, Daniella. "Phishing attacks targeting hospitals : A study over phishing knowledge at Blekingesjukhuset." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16681.
Full textYelne, Samir. "Measures of User Interactions, Conversations, and Attacks in a Crowdsourced Platform Offering Emotional Support." Wright State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=wright1482330888961028.
Full textSalem, Omran S. A. "An Integrated Intelligent Approach to Enhance the Security Control of IT Systems. A Proactive Approach to Security Control Using Artificial Fuzzy Logic to Strengthen the Authentication Process and Reduce the Risk of Phishing." Thesis, University of Bradford, 2012. http://hdl.handle.net/10454/14863.
Full textForde, Edward Steven. "Security Strategies for Hosting Sensitive Information in the Commercial Cloud." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3604.
Full textBooks on the topic "Social engineering attacks"
Hamilton, Nicola. Attack of the genetically engineered tomatoes: Ethical dilemma of the 90s. Stowmarket: Whittet, 1998.
Find full textLobanov, Aleksey. Medical and biological bases of safety. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1439619.
Full textCybersecurity Threats, Malware Trends, and Strategies: Mitigate Exploits, Malware, Phishing, and Other Social Engineering Attacks. Packt Publishing, Limited, 2020.
Find full textBook chapters on the topic "Social engineering attacks"
Raman, Karthik, Susan Baumes, Kevin Beets, and Carl Ness. "Social-Engineering and Low-Tech Attacks." In Computer Security Handbook, 19.1–19.25. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch19.
Full textSmith, Aaron, Maria Papadaki, and Steven M. Furnell. "Improving Awareness of Social Engineering Attacks." In Information Assurance and Security Education and Training, 249–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39377-8_29.
Full textSaleem, Jibran, and Mohammad Hammoudeh. "Defense Methods Against Social Engineering Attacks." In Computer and Network Security Essentials, 603–18. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_35.
Full textHeartfield, Ryan, and George Loukas. "Protection Against Semantic Social Engineering Attacks." In Versatile Cybersecurity, 99–140. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97643-3_4.
Full textIrani, Danesh, Marco Balduzzi, Davide Balzarotti, Engin Kirda, and Calton Pu. "Reverse Social Engineering Attacks in Online Social Networks." In Detection of Intrusions and Malware, and Vulnerability Assessment, 55–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22424-9_4.
Full textGonzalez, Jose J., Jose M. Sarriegi, and Alazne Gurrutxaga. "A Framework for Conceptualizing Social Engineering Attacks." In Critical Information Infrastructures Security, 79–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11962977_7.
Full textMashtalyar, Nikol, Uwera Nina Ntaganzwa, Thales Santos, Saqib Hakak, and Suprio Ray. "Social Engineering Attacks: Recent Advances and Challenges." In HCI for Cybersecurity, Privacy and Trust, 417–31. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77392-2_27.
Full textMokoena, Tebogo, Tranos Zuva, and Martin Appiah. "Analysis of Social Engineering Attacks Using Exploit Kits." In Intelligent Algorithms in Software Engineering, 189–204. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51965-0_16.
Full textTaib, Ronnie, Kun Yu, Shlomo Berkovsky, Mark Wiggins, and Piers Bayl-Smith. "Social Engineering and Organisational Dependencies in Phishing Attacks." In Human-Computer Interaction – INTERACT 2019, 564–84. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29381-9_35.
Full textNguyen, Christopher, Walt Williams, Brandon Didlake, Donte Mitchell, James McGinnis, and Dipankar Dasgupta. "Social Engineering Attacks in Healthcare Systems: A Survey." In National Cyber Summit (NCS) Research Track 2021, 141–50. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84614-5_11.
Full textConference papers on the topic "Social engineering attacks"
Nelson, Jennifer, X. Lin, C. Chen, J. Iglesias, and J. J. Li. "Social Engineering for Security Attacks." In the The 3rd Multidisciplinary International Social Networks Conference. New York, New York, USA: ACM Press, 2016. http://dx.doi.org/10.1145/2955129.2955158.
Full textGupta, Surbhi, Abhishek Singhal, and Akanksha Kapoor. "A literature survey on social engineering attacks: Phishing attack." In 2016 International Conference on Computing, Communication and Automation (ICCCA). IEEE, 2016. http://dx.doi.org/10.1109/ccaa.2016.7813778.
Full textLutz, Adam, Victor Sansing, Waleed E. Farag, and Soundararajan Ezekiel. "Malware and social engineering attacks on healthcare." In Disruptive Technologies in Information Sciences III, edited by Misty Blowers, Russell D. Hall, and Venkateswara R. Dasari. SPIE, 2019. http://dx.doi.org/10.1117/12.2533344.
Full textArabia-Obedoza, Maha Rita, Gloria Rodriguez, Amber Johnston, Fatima Salahdine, and Naima Kaabouch. "Social Engineering Attacks A Reconnaissance Synthesis Analysis." In 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2020. http://dx.doi.org/10.1109/uemcon51285.2020.9298100.
Full textKrombholz, Katharina, Heidelinde Hobel, Markus Huber, and Edgar Weippl. "Social engineering attacks on the knowledge worker." In the 6th International Conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2523514.2523596.
Full textLi, Tong, Kaiyuan Wang, and Jennifer Horkoff. "Towards Effective Assessment for Social Engineering Attacks." In 2019 IEEE 27th International Requirements Engineering Conference (RE). IEEE, 2019. http://dx.doi.org/10.1109/re.2019.00051.
Full textKano, Yuki, and Tatsuo Nakajima. "Trust Factors of Social Engineering Attacks on Social Networking Services." In 2021 IEEE 3rd Global Conference on Life Sciences and Technologies (LifeTech). IEEE, 2021. http://dx.doi.org/10.1109/lifetech52111.2021.9391929.
Full textChen, Guangxuan, Guomin Zhou, Zhoujie Mao, Qiang Liu, Ziwan Zheng, Guangxiao Chen, and Panke Qin. "Research of Social Engineering Attacks in Telecommunications Fraud." In 2015 International Conference on Social Science, Education Management and Sports Education. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/ssemse-15.2015.477.
Full textBhakta, Ram, and Ian G. Harris. "Semantic analysis of dialogs to detect social engineering attacks." In 2015 IEEE International Conference on Semantic Computing (ICSC). IEEE, 2015. http://dx.doi.org/10.1109/icosc.2015.7050843.
Full textJanczewski, L. J., and Lingyan Fu. "Social engineering-based attacks: Model and new zealand perspective." In 2010 International Multiconference on Computer Science and Information Technology (IMCSIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/imcsit.2010.5680026.
Full text