Results 31 to 40 of about 318,491 (290)

IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN [PDF]

open access: yes, 2020
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
Bhowmik, Deepayan   +2 more
core   +3 more sources

Analysis of Recent Attacks Based on Social Engineering Techniques [PDF]

open access: yes, 2018
This paper attempts to strengthen the pursued research on social engineering (SE) threat identification, and control, by means of the author’s illustrated classification, which includes attack types, determining the degree of possible harm to each types ...
Korzhenko, O. Y., Sokolov, V. Y.
core   +2 more sources

AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures

open access: yes中国工程科学, 2021
 Artificial intelligence (AI) brings significant societal progress and it also revolutionizes the cybersecurity sector. Thus, studying the security problems induced by the deep fusion of AI and cyberspace security becomes significant. In this article, we
Fang Binxing   +3 more
doaj   +1 more source

The innocent hill walker [PDF]

open access: yes, 2012
Criminals are going to ever more extreme lengths to get access to company systems and home computers, according to Les Ball and Natalie ...
Ball, Les, Coull, Natalie
core   +3 more sources

DoS Attack Impact Assessment on Software Defined Networks [PDF]

open access: yes, 2018
© 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Software Defined Networking (SDN) is an evolving network paradigm which promises greater interoperability, more innovation, flexible and effective ...
Awan, I   +5 more
core   +1 more source

Human Cognition Through the Lens of Social Engineering Cyberattacks

open access: yesFrontiers in Psychology, 2020
Social engineering cyberattacks are a major threat because they often prelude sophisticated and devastating cyberattacks. Social engineering cyberattacks are a kind of psychological attack that exploits weaknesses in human cognitive functions.
Rosana Montañez   +2 more
doaj   +1 more source

Defining Social Engineering in Cybersecurity

open access: yesIEEE Access, 2020
Social engineering has posed a serious security threat to infrastructure, user, data and operations of cyberspace. Nevertheless, there are many conceptual deficiencies (such as inconsistent conceptual intensions, a vague conceptual boundary, confusing ...
Zuoguang Wang, Limin Sun, Hongsong Zhu
doaj   +1 more source

Investigation into Phishing Risk Behaviour among Healthcare Staff

open access: yesInformation, 2022
A phishing attack is one of the less complicated ways to circumvent sophisticated technical security measures. It is often used to exploit psychological (as as well as other) factors of human users to succeed in social engineering attacks including ...
Prosper Kandabongee Yeng   +3 more
doaj   +1 more source

Weighted Multiclass Intrusion Detection System [PDF]

open access: yesITM Web of Conferences, 2023
Attackers are continuously coming up with new attack strategies since cyber security is a field that is continually changing. As a result, it’s important to update and enhance the system frequently to ensure its efficiency against fresh threats ...
Dange Varsha   +5 more
doaj   +1 more source

Social Engineering: I-E based Model of Human Weakness for Attack and Defense Investigations [PDF]

open access: yes, 2017
Social engineering is the attack aimed to manipulate dupe to divulge sensitive information or take actions to help the adversary bypass the secure perimeter in front of the information-related resources so that the attacking goals can be completed ...
Fan, Wenjun   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy