[go: up one dir, main page]

Frumento et al., 2016 - Google Patents

The role of Social Engineering in evolution of attacks

Frumento et al., 2016

View PDF
Document ID
16632695970833780246
Author
Frumento E
Puricelli R
Freschi F
Ariu D
Weiss N
Dambra C
Cotoi I
Roccetti P
Rodriguez M
Adrei L
Marinelli G
Kandela G
Pachego B
Publication year

External Links

Snippet

This document has been produced in the context of the DOGANA Project. The DOGANA project is part of the European Community's Horizon 2020 Program for research and development and is as such funded by the European Commission. All information in this …
Continue reading at pfigshare-u-files.s3.amazonaws.com (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Jain et al. A survey of phishing attack techniques, defence mechanisms and open research challenges
Grimes Hacking the hacker: Learn from the experts who take down hackers
Chen et al. Exploring internet security perceptions and practices in urban ghana
Verma et al. Cyber security: A review of cyber crimes, security challenges and measures to control
Wilner et al. On the social science of ransomware: Technology, security, and society
Broadhurst Cybercrime: Thieves, swindlers, bandits, and privateers in cyberspace
Imtiaz et al. Analysis of Cybersecurity Measures for Detection, Prevention, and Misbehaviour of Social Systems
Frumento et al. The role of Social Engineering in evolution of attacks
Gregory et al. Security and the networked society
Sundaram The dark side of social media: a reality becoming more contemporary by the day
Nyasvisvo et al. Phishing attacks: A security challenge for university students studying remotely
Anderson Online utilization for terrorist self-radicalization purposes
Zhang et al. The Evolution of Integrated Advance Persistent Threat and Its Defense Solutions: A Literature Review
Shinde Introduction to cyber security: Guide to the World of Cyber Security
Hudaib Comprehensive social media security analysis & xkeyscore espionage technology
Sénécal The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet
Thiyagu et al. Cyber safety and security education
Sodhi Social Media Law & Cybercrime
Perova Creating guidelines and best practices against phishing and ransomware attacks for healthcare personnel
Ezeji Emerging technologies and cyber-crime: strategies for mitigating cyber-crime and misinformation on social media and cyber systems
Ajayi Internet Technologies and Cybersecurity Law in Nigeria
Tanti Study of Phishing Attack and their Prevention Techniques
Khan et al. What is Mobile Phishing and How to Detect it
Kalajžić Cybersecurity-the threat of social engineering
Roddel The Ultimate Guide to Internet Safety Second Edition