Journal articles on the topic 'Social engineering attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Social engineering attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shi, Zheyuan Ryan, Aaron Schlenker, Brian Hay, Daniel Bittleston, Siyu Gao, Emily Peterson, John Trezza, and Fei Fang. "Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 08 (April 3, 2020): 13363–68. http://dx.doi.org/10.1609/aaai.v34i08.7050.
Full textLuo, Xin, Richard Brody, Alessandro Seazzu, and Stephen Burd. "Social Engineering." Information Resources Management Journal 24, no. 3 (July 2011): 1–8. http://dx.doi.org/10.4018/irmj.2011070101.
Full textSalahdine, Fatima, and Naima Kaabouch. "Social Engineering Attacks: A Survey." Future Internet 11, no. 4 (April 2, 2019): 89. http://dx.doi.org/10.3390/fi11040089.
Full textKrombholz, Katharina, Heidelinde Hobel, Markus Huber, and Edgar Weippl. "Advanced social engineering attacks." Journal of Information Security and Applications 22 (June 2015): 113–22. http://dx.doi.org/10.1016/j.jisa.2014.09.005.
Full textYe, Ziwei, Yuanbo Guo, Ankang Ju, Fushan Wei, Ruijie Zhang, and Jun Ma. "A Risk Analysis Framework for Social Engineering Attack Based on User Profiling." Journal of Organizational and End User Computing 32, no. 3 (July 2020): 37–49. http://dx.doi.org/10.4018/joeuc.2020070104.
Full textBeckers, Kristian, Leanid Krautsevich, and Artsiom Yautsiukhin. "Using Attack Graphs to Analyze Social Engineering Threats." International Journal of Secure Software Engineering 6, no. 2 (April 2015): 47–69. http://dx.doi.org/10.4018/ijsse.2015040103.
Full textAlhamad, Amal, Dalal Aldablan, and Raghad Albahlal. "Examination of Assorted Social Engineering Attack by Different Types of Machine Learning Algorithms." International Journal of Computer Science and Mobile Computing 10, no. 7 (July 30, 2021): 56–60. http://dx.doi.org/10.47760/ijcsmc.2021.v10i07.008.
Full textVLAD, Ionela-Mariana. "Security of Personal Data in Social Networks." International Journal of Information Security and Cybercrime 7, no. 2 (December 29, 2018): 14–24. http://dx.doi.org/10.19107/ijisc.2018.02.02.
Full textAldawood, Hussain, and Geoffrey Skinner. "An Advanced Taxonomy for Social Engineering Attacks." International Journal of Computer Applications 177, no. 30 (January 16, 2020): 1–11. http://dx.doi.org/10.5120/ijca2020919744.
Full textSarriegi, Jose M., and Jose J. Gonzalez. "Conceptualising social engineering attacks through system archetypes." International Journal of System of Systems Engineering 1, no. 1/2 (2008): 111. http://dx.doi.org/10.1504/ijsse.2008.018134.
Full textSokolov, Volodymyr Yu, and Davyd M. Kurbanmuradov. "METHOD OF COUNTERACTION IN SOCIAL ENGINEERING ON INFORMATION ACTIVITY OBJECTIVES." Cybersecurity: Education, Science, Technique, no. 1 (2018): 6–16. http://dx.doi.org/10.28925/2663-4023.2018.1.616.
Full textAzarov, Artur Alexandrovich, Elena Victorovna Brodovskaya, Anastasia Victorovna Vakhromeeva, Andrey Alexandrovich Glazkov, Oksana Vladimirovna Dmitrieva, Valeriya Fuatovna Musina, Vladimir Dmitrievich Nechaev, et al. "Memes and social engineering attacks in virtual space." SPIIRAS Proceedings 7, no. 30 (March 17, 2014): 88. http://dx.doi.org/10.15622/sp.30.7.
Full textCletus, Azaabi, and Ussiph Najim. "Towards Securing Organizational Data against Social Engineering Attacks." International Journal of Computer Applications 180, no. 28 (March 20, 2018): 28–34. http://dx.doi.org/10.5120/ijca2018916649.
Full textChoi, Dongmin, Cheolheon Baek, and Ilyong Chung. "Virtual Keyboard against Social Engineering Attacks in Smartphones." Journal of Korea Multimedia Society 18, no. 3 (March 30, 2015): 368–75. http://dx.doi.org/10.9717/kmms.2015.18.3.368.
Full textMarczak, William R., and Vern Paxson. "Social Engineering Attacks on Government Opponents: Target Perspectives." Proceedings on Privacy Enhancing Technologies 2017, no. 2 (April 1, 2017): 172–85. http://dx.doi.org/10.1515/popets-2017-0022.
Full textPatel, Naiya. "SOCIAL ENGINEERING AS AN EVOLUTIONARY THREAT TO INFORMATION SECURITY IN HEALTHCARE ORGANIZATIONS." Jurnal Administrasi Kesehatan Indonesia 8, no. 1 (March 28, 2020): 56. http://dx.doi.org/10.20473/jaki.v8i1.2020.56-64.
Full textCampbell, Curtis C. "Solutions for counteracting human deception in social engineering attacks." Information Technology & People 32, no. 5 (October 7, 2019): 1130–52. http://dx.doi.org/10.1108/itp-12-2017-0422.
Full textAlharthi, Dalal, and Amelia Regan. "A Literature Survey and Analysis on Social Engineering Defense Mechanisms and Infosec Policies." International Journal of Network Security & Its Applications 13, no. 2 (March 31, 2021): 41–61. http://dx.doi.org/10.5121/ijnsa.2021.13204.
Full textConteh, Nabie Y., and Paul J. Schmick. "Cybersecurity:risks, vulnerabilities and countermeasures to prevent social engineering attacks." International Journal of Advanced Computer Research 6, no. 23 (February 12, 2016): 31–38. http://dx.doi.org/10.19101/ijacr.2016.623006.
Full textAldawood, Hussain, and Geoffrey Skinner. "A Taxonomy for Social Engineering Attacks via Personal Devices." International Journal of Computer Applications 178, no. 50 (September 17, 2019): 19–26. http://dx.doi.org/10.5120/ijca2019919411.
Full textPower, Richard, and Dario Forte. "Social engineering: attacks have evolved, but countermeasures have not." Computer Fraud & Security 2006, no. 10 (October 2006): 17–20. http://dx.doi.org/10.1016/s1361-3723(06)70433-x.
Full textShin, Dong Cheon, and Young Hoo Park. "Development of Risk Assessment Indices for Social Engineering Attacks." Journal of Security Engineering 14, no. 2 (April 30, 2017): 143–56. http://dx.doi.org/10.14257/jse.2017.04.01.
Full textBullée, Jan-Willem Hendrik, Lorena Montoya, Wolter Pieters, Marianne Junger, and Pieter Hartel. "On the anatomy of social engineering attacks-A literature-based dissection of successful attacks." Journal of Investigative Psychology and Offender Profiling 15, no. 1 (July 14, 2017): 20–45. http://dx.doi.org/10.1002/jip.1482.
Full textFranchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information Attacks on Online Social Networks." Journal of Information Technology Research 7, no. 3 (July 2014): 54–71. http://dx.doi.org/10.4018/jitr.2014070104.
Full textHeartfield, Ryan, and George Loukas. "A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks." ACM Computing Surveys 48, no. 3 (February 8, 2016): 1–39. http://dx.doi.org/10.1145/2835375.
Full textMedlin, B. Dawn, Joseph A. Cazier, and Daniel P. Foulk. "Analyzing the Vulnerability of U.S. Hospitals to Social Engineering Attacks." International Journal of Information Security and Privacy 2, no. 3 (July 2008): 71–83. http://dx.doi.org/10.4018/jisp.2008070106.
Full textFranchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information and Password Attacks on Social Networks." Journal of Information Technology Research 8, no. 1 (January 2015): 25–42. http://dx.doi.org/10.4018/jitr.2015010103.
Full textVolkov, A. K., A. K. Volkov, and L. I. Frolova. "Research of the aviation personnel vulnerability profile to social engineering attacks." Civil Aviation High Technologies 23, no. 2 (April 22, 2020): 20–32. http://dx.doi.org/10.26467/2079-0619-2020-23-2-20-32.
Full textKim, Do-Woo, and Gyu-Peom Lee. "A Study on the Classifying the Type of Social Engineering Attacks." Korean Journal of Industry Security 9, no. 2 (December 30, 2019): 9–21. http://dx.doi.org/10.33388/kais.2019.9.2.009.
Full textPark, Younghoo, and Dongcheon Shin. "A Risk Assessment Scheme of Social Engineering Attacks for Enterprise Organizations." Jouranl of Information and Security 19, no. 1 (March 31, 2019): 103–10. http://dx.doi.org/10.33778/kcsa.2019.19.1.103.
Full textKhidzir, Nik Zulkarnaen, and Shekh Abdullah-Al-Musa Ahmed. "Viewpoint of Probabilistic Risk Assessment in Artificial Enabled Social Engineering Attacks." Journal of Contemporary Issues and Thought 9 (August 15, 2019): 12–17. http://dx.doi.org/10.37134/jcit.vol9.2.2019.
Full textTak, Dongkil, and Dongmin Choi. "Layered Pattern Authentication Scheme on Smartphone Resistant to Social Engineering Attacks." Journal of Korea Multimedia Society 19, no. 2 (February 28, 2016): 280–90. http://dx.doi.org/10.9717/kmms.2016.19.2.280.
Full textJunger, M., L. Montoya, and F. J. Overink. "Priming and warnings are not effective to prevent social engineering attacks." Computers in Human Behavior 66 (January 2017): 75–87. http://dx.doi.org/10.1016/j.chb.2016.09.012.
Full textKarpati, Peter, Guttorm Sindre, and Raimundas Matulevicius. "Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks." International Journal of Secure Software Engineering 3, no. 2 (April 2012): 54–73. http://dx.doi.org/10.4018/jsse.2012040103.
Full textEndsley, Mica R. "Combating Information Attacks in the Age of the Internet: New Challenges for Cognitive Engineering." Human Factors: The Journal of the Human Factors and Ergonomics Society 60, no. 8 (October 30, 2018): 1081–94. http://dx.doi.org/10.1177/0018720818807357.
Full textBakhshi, Taimur, Maria Papadaki, and Steven Furnell. "Social engineering: assessing vulnerabilities in practice." Information Management & Computer Security 17, no. 1 (March 20, 2009): 53–63. http://dx.doi.org/10.1108/09685220910944768.
Full textKhlobystova, A. O., M. V. Abramov, A. L. Tulupyev, and A. A. Zolotin. "Search for the shortest trajectory of a social engeneering attack between a pair of users in a graph with transition probabilities." Information and Control Systems, no. 6 (December 18, 2018): 74–81. http://dx.doi.org/10.31799/1684-8853-2018-6-74-81.
Full textSchaab, Peter, Kristian Beckers, and Sebastian Pape. "Social engineering defence mechanisms and counteracting training strategies." Information & Computer Security 25, no. 2 (June 12, 2017): 206–22. http://dx.doi.org/10.1108/ics-04-2017-0022.
Full textNifakos, Sokratis, Krishna Chandramouli, Charoula Konstantina Nikolaou, Panagiotis Papachristou, Sabine Koch, Emmanouil Panaousis, and Stefano Bonacina. "Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review." Sensors 21, no. 15 (July 28, 2021): 5119. http://dx.doi.org/10.3390/s21155119.
Full textDorr, Bonnie, Archna Bhatia, Adam Dalton, Brodie Mather, Bryanna Hebenstreit, Sashank Santhanam, Zhuo Cheng, Samira Shaikh, Alan Zemel, and Tomek Strzalkowski. "Detecting Asks in Social Engineering Attacks: Impact of Linguistic and Structural Knowledge." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 05 (April 3, 2020): 7675–82. http://dx.doi.org/10.1609/aaai.v34i05.6269.
Full textHidayah, Imas Rahmadhtul. "Representasi Social Engineering Dalam Tindak Kejahatan Dunia Maya (Analisis Semiotika Pada Film Firewall)." Tibanndaru : Jurnal Ilmu Perpustakaan dan Informasi 4, no. 1 (April 1, 2020): 30. http://dx.doi.org/10.30742/tb.v4i1.905.
Full textKaur, Sukhdilpreet, and Amandeep Verma. "Ontological Engineering Approach Towards Botnet Detection in Network Forensics." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 9 (September 15, 2013): 1990–2001. http://dx.doi.org/10.24297/ijct.v10i9.1390.
Full textRohit, M., and Ceronmani Sharmila. "A Secure User Image Privacy Preserving Technique to Avoid Clone Attack in Online Social Network." Journal of Computational and Theoretical Nanoscience 17, no. 5 (May 1, 2020): 2304–7. http://dx.doi.org/10.1166/jctn.2020.8888.
Full textBullee, Jan-Willem, and Marianne Junger. "How effective are social engineering interventions? A meta-analysis." Information & Computer Security 28, no. 5 (August 5, 2020): 801–30. http://dx.doi.org/10.1108/ics-07-2019-0078.
Full textBullée, Jan-Willem H., Lorena Montoya, Wolter Pieters, Marianne Junger, and Pieter H. Hartel. "The persuasion and security awareness experiment: reducing the success of social engineering attacks." Journal of Experimental Criminology 11, no. 1 (January 20, 2015): 97–115. http://dx.doi.org/10.1007/s11292-014-9222-7.
Full textAbraham Kalloor, Eric, Dr Manoj Kumar Mishra, and Prof Joy Paulose. "Phishfort – Anti-Phishing Framework." International Journal of Engineering & Technology 7, no. 3.4 (June 25, 2018): 42. http://dx.doi.org/10.14419/ijet.v7i3.4.14673.
Full textBux, Khuda, Muhammad Yousaf, Akhtar Hussain Jalbani, and Komal Batool. "Detection of Malicious Servers for Preventing Client-Side Attacks." January 2021 40, no. 1 (January 1, 2021): 230–40. http://dx.doi.org/10.22581/muet1982.2101.20.
Full textYin, Dan, Yiran Shen, and Chenyang Liu. "Attribute Couplet Attacks and Privacy Preservation in Social Networks." IEEE Access 5 (2017): 25295–305. http://dx.doi.org/10.1109/access.2017.2769090.
Full textLawson, Patrick, Olga Zielinska, Carl Pearson, and Christopher B. Mayhorn. "Interaction of Personality and Persuasion Tactics in Email Phishing Attacks." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 1331–33. http://dx.doi.org/10.1177/1541931213601815.
Full textCiampa, Mark, and Ray Blankenship. "Do Students and Instructors See Cybersecurity the Same? A Comparison of Perceptions About Selected Cybersecurity Topics." International Journal for Innovation Education and Research 7, no. 1 (January 31, 2019): 121–35. http://dx.doi.org/10.31686/ijier.vol7.iss1.1291.
Full text