Results 41 to 50 of about 2,195,820 (278)
Classifying Swahili Smishing Attacks for Mobile Money Users: A Machine-Learning Approach
Due to the massive adoption of mobile money in Sub-Saharan countries, the global transaction value of mobile money exceeded $\$ $ 2 billion in 2021. Projections show transaction values will exceed $\$ $ 3 billion by the end of 2022, and Sub-Saharan ...
Iddi S. Mambina +2 more
doaj +1 more source
Social Embeddedness and Agent Development [PDF]
Two different reasons for using agents are distinguished: the `engineering' perspective and the `social simulation' perspective. It is argued that this entails some differences in approach.
Edmonds, Bruce
core
Case Study On Social Engineering Techniques for Persuasion [PDF]
There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most of them even ...
Hasan, Mosin +2 more
core +3 more sources
An intracellular transporter mitigates the CO2‐induced decline in iron content in Arabidopsis shoots
This study identifies a gene encoding a transmembrane protein, MIC, which contributes to the reduction of shoot Fe content observed in plants under elevated CO2. MIC is a putative Fe transporter localized to the Golgi and endosomal compartments. Its post‐translational regulation in roots may represent a potential target for improving plant nutrition ...
Timothy Mozzanino +7 more
wiley +1 more source
In the field of information security, there are several areas of study that are under development. Social engineering is one of them that addresses the multidisciplinary challenges of cyber security.
Patricio Zambrano +6 more
doaj +1 more source
The Design and Evaluation of an Interactive Social Engineering Training Programme [PDF]
Social engineering is a major issue affecting organisational security. Educating employees on how to avoid social engineering attacks is important because social engineering tries to penetrate an organisation by using employees to grant authorized ...
Alkhamis, Esra, Renaud, Karen
core
By dawn or dusk—how circadian timing rewrites bacterial infection outcomes
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo +2 more
wiley +1 more source
Hematopoietic (stem) cells—The elixir of life?
The aging of HSCs (hematopoietic stem cells) and the blood system leads to the decline of other organs. Rejuvenating aged HSCs improves the function of the blood system, slowing the aging of the heart, kidney, brain, and liver, and the occurrence of age‐related diseases.
Emilie L. Cerezo +4 more
wiley +1 more source
Social Engineering—The Hidden Control
The former energy-wasting lifestyles of developed societies can no longer be sustained. In our age, efficiency is the key to continued sustainability. Increasing efficiency requires the use of infocommunication systems and their regulation.
Edina Albininé Budavári +1 more
doaj +1 more source
Countering Social Engineering through Social Media: An Enterprise Security Perspective
The increasing threat of social engineers targeting social media channels to advance their attack effectiveness on company data has seen many organizations introducing initiatives to better understand these vulnerabilities.
C Colwill +8 more
core +1 more source

