Results 31 to 40 of about 318,491 (290)
IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN [PDF]
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
Bhowmik, Deepayan +2 more
core +3 more sources
Analysis of Recent Attacks Based on Social Engineering Techniques [PDF]
This paper attempts to strengthen the pursued research on social engineering (SE) threat identification, and control, by means of the author’s illustrated classification, which includes attack types, determining the degree of possible harm to each types ...
Korzhenko, O. Y., Sokolov, V. Y.
core +2 more sources
AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures
Artificial intelligence (AI) brings significant societal progress and it also revolutionizes the cybersecurity sector. Thus, studying the security problems induced by the deep fusion of AI and cyberspace security becomes significant. In this article, we
Fang Binxing +3 more
doaj +1 more source
The innocent hill walker [PDF]
Criminals are going to ever more extreme lengths to get access to company systems and home computers, according to Les Ball and Natalie ...
Ball, Les, Coull, Natalie
core +3 more sources
DoS Attack Impact Assessment on Software Defined Networks [PDF]
© 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Software Defined Networking (SDN) is an evolving network paradigm which promises greater interoperability, more innovation, flexible and effective ...
Awan, I +5 more
core +1 more source
Human Cognition Through the Lens of Social Engineering Cyberattacks
Social engineering cyberattacks are a major threat because they often prelude sophisticated and devastating cyberattacks. Social engineering cyberattacks are a kind of psychological attack that exploits weaknesses in human cognitive functions.
Rosana Montañez +2 more
doaj +1 more source
Defining Social Engineering in Cybersecurity
Social engineering has posed a serious security threat to infrastructure, user, data and operations of cyberspace. Nevertheless, there are many conceptual deficiencies (such as inconsistent conceptual intensions, a vague conceptual boundary, confusing ...
Zuoguang Wang, Limin Sun, Hongsong Zhu
doaj +1 more source
Investigation into Phishing Risk Behaviour among Healthcare Staff
A phishing attack is one of the less complicated ways to circumvent sophisticated technical security measures. It is often used to exploit psychological (as as well as other) factors of human users to succeed in social engineering attacks including ...
Prosper Kandabongee Yeng +3 more
doaj +1 more source
Weighted Multiclass Intrusion Detection System [PDF]
Attackers are continuously coming up with new attack strategies since cyber security is a field that is continually changing. As a result, it’s important to update and enhance the system frequently to ensure its efficiency against fresh threats ...
Dange Varsha +5 more
doaj +1 more source
Social Engineering: I-E based Model of Human Weakness for Attack and Defense Investigations [PDF]
Social engineering is the attack aimed to manipulate dupe to divulge sensitive information or take actions to help the adversary bypass the secure perimeter in front of the information-related resources so that the attacking goals can be completed ...
Fan, Wenjun +2 more
core +2 more sources

