Results 21 to 30 of about 318,491 (290)
The penetration test has many repetitive operations and requires advanced expert knowledge, therefore, the manual penetration test is inefficient. With the development of reinforcement learning, the intelligent penetration test has been a research ...
Yang Li +4 more
doaj +1 more source
Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher +3 more
core +1 more source
A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks [PDF]
Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that employ a variety of attack vectors and strategies to psychologically manipulate a user.
Heartfield, Ryan, Loukas, George
core +2 more sources
The purpose of this review article is to determine approaches to solving existing problems in taking into account the psychological aspects of an organization’s information security in the context of socio-engineering attacks based on the analysis and ...
T. V. Tulupieva
doaj +1 more source
Social Engineering Attack Strategies and Defence Approaches [PDF]
This paper examines the role and value of information security awareness efforts in defending against social engineering attacks. It categories the different social engineering threats and tactics used in targeting employees and the approaches to defend against such attacks.
Ghafir, I +3 more
openaire +2 more sources
Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to psychological manipulation and have been growing in frequency with no end in sight.
David Airehrour +2 more
doaj +1 more source
SEADer++: social engineering attack detection in online environments using machine learning
Social engineering attacks are one of the most well-known and easiest to apply attacks in the cybersecurity domain. Research has shown that the majority of attacks against computer systems was based on the use of social engineering methods.
Merton Lansley +3 more
doaj +1 more source
Case Study On Social Engineering Techniques for Persuasion [PDF]
There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most of them even ...
Hasan, Mosin +2 more
core +3 more sources
Social Engineering Attacks During the COVID-19 Pandemic [PDF]
The prevailing conditions surrounding the COVID-19 pandemic has shifted a variety of everyday activities onto platforms on the Internet. This has led to an increase in the number of people present on these platforms and also led to jump in the time spent by existing participants online.
Venkatesha, Sushruth +2 more
openaire +2 more sources
It is important to comprehend the attacker’s behavior and capacity in order to build a stronger fortress and thus be able to protect valuable assets more effectively.
Faranak Abri +3 more
doaj +1 more source

