Results 1 to 10 of about 2,195,820 (278)
Review OSINT tool for social engineering [PDF]
In recent years, we observed an increase in cyber threats, especially social engineering attacks. By social engineering, we mean a set of techniques and tools to collect information about a person or target to extort sensitive information.
Martina Nobili
doaj +2 more sources
Financial Fraud Detection on Social Networks Based on a Data Mining Approach [PDF]
The article summarizes the arguments and counter-arguments within the scientific debate on the issue of researching financial frauds in the Internet. The main goal of the research is to develop methodological principles for identifying financial cyber ...
Victoria Bozhenko +2 more
doaj +1 more source
The purpose of this review article is to determine approaches to solving existing problems in taking into account the psychological aspects of an organization’s information security in the context of socio-engineering attacks based on the analysis and ...
T. V. Tulupieva
doaj +1 more source
Oltalama Saldırıları Farkındalık Tatbikatı Örneği
Kullanıcılar bilgi güvenliği zincirinde en zayıf halka olarak görülmektedir. Kurumlarda bilgi güvenliğini sağlamaya yönelik pek çok sistem kurulsa da bunlar tam bir güvenlik sağlayamamakta, bazı saldırıların kullanıcılara ulaşmasını engelleyememektedir ...
Yenal Arslan
doaj +1 more source
MAZEPHISHING: THE COVID-19 PANDEMIC AS CREDIBLE SOCIAL CONTEXT FOR SOCIAL ENGINEERING ATTACKS [PDF]
The first months of the COVID-19 pandemic witnessed a surge of social engineering attacks. Although the pandemic is certainly not the first occurrence of socially disruptive circumstances that drive cybercrime, relevant academic scholarship has remained ...
Kristjan Kikerpill, Andra Siibak
doaj +1 more source
identifier:oai:t2r2.star.titech.ac.jp ...
Kamalakshi Naganna, Chethana R Kariger
+9 more sources
This paper proposes a double-layer network game model based on asymmetric information, hoping to explore the impact of asymmetric information dissemination on the evolution of cooperation.
Xiaoming Gong
doaj +1 more source
The establishment of a waste bank could be a social engineering tool for changing the mindset of students. This waste bank can be managed and made useful via the so-called “3R” concept (reduce, reuse, and recycle), which is the main principle used by ...
Muljaningsih Sri
doaj +1 more source
An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation [PDF]
Background and Objectives: Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of ...
M. Amiri, A. Barati
doaj +1 more source
The possibilities of social planning in the aspect of training of children-northerners with special needs to independent adult life [PDF]
The problem of lack of training of northerner children with special needs to adulthood is investigated using the definition of independence, and possible solution to this problem is to implement such a technology of social work as social project planning.
Lia A. Melkaya
doaj +1 more source

