|
|
|
Ahlam Fakieh and Aymen Akremi
Social engineering (SE) attacks (also called social hacking) refer to various methods used by cybercriminals to exploit the weak nature of human beings rather than the logical and physical security measures used by organizations. This research paper stud...
ver más
|
|
|
|
|
|
|
Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Bian Yang and Peter Nimbe
A phishing attack is one of the less complicated ways to circumvent sophisticated technical security measures. It is often used to exploit psychological (as as well as other) factors of human users to succeed in social engineering attacks including ranso...
ver más
|
|
|
|
|
|
|
Yang Li, Yongjie Wang, Xinli Xiong, Jingye Zhang and Qian Yao
The penetration test has many repetitive operations and requires advanced expert knowledge, therefore, the manual penetration test is inefficient. With the development of reinforcement learning, the intelligent penetration test has been a research hotspo...
ver más
|
|
|
|
|
|
|
David Airehrour, Nisha Vasudevan Nair and Samaneh Madanian
Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to psychological manipulation and have been growing in frequency with no end in sight. This research study assesse...
ver más
|
|
|
|
|
|
|
Ruti Gafni, Tal Pavel, Raz Margolin, Ben Weiss
Pág. 27 - 41
Passwords are the standard means of registration and access to Websites, information systems, online services and various social networks. Databases are increasingly breached and social engineering is employed to obtain usernames and passwords for online...
ver más
|
|
|
|