Frumento et al., 2016 - Google Patents
The role of Social Engineering in evolution of attacksFrumento et al., 2016
View PDF- Document ID
- 16632695970833780246
- Author
- Frumento E
- Puricelli R
- Freschi F
- Ariu D
- Weiss N
- Dambra C
- Cotoi I
- Roccetti P
- Rodriguez M
- Adrei L
- Marinelli G
- Kandela G
- Pachego B
- Publication year
External Links
Snippet
This document has been produced in the context of the DOGANA Project. The DOGANA project is part of the European Community's Horizon 2020 Program for research and development and is as such funded by the European Commission. All information in this …
- 230000018109 developmental process 0 abstract description 14
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jain et al. | A survey of phishing attack techniques, defence mechanisms and open research challenges | |
Grimes | Hacking the hacker: Learn from the experts who take down hackers | |
Chen et al. | Exploring internet security perceptions and practices in urban ghana | |
Verma et al. | Cyber security: A review of cyber crimes, security challenges and measures to control | |
Wilner et al. | On the social science of ransomware: Technology, security, and society | |
Broadhurst | Cybercrime: Thieves, swindlers, bandits, and privateers in cyberspace | |
Imtiaz et al. | Analysis of Cybersecurity Measures for Detection, Prevention, and Misbehaviour of Social Systems | |
Frumento et al. | The role of Social Engineering in evolution of attacks | |
Gregory et al. | Security and the networked society | |
Sundaram | The dark side of social media: a reality becoming more contemporary by the day | |
Nyasvisvo et al. | Phishing attacks: A security challenge for university students studying remotely | |
Anderson | Online utilization for terrorist self-radicalization purposes | |
Zhang et al. | The Evolution of Integrated Advance Persistent Threat and Its Defense Solutions: A Literature Review | |
Shinde | Introduction to cyber security: Guide to the World of Cyber Security | |
Hudaib | Comprehensive social media security analysis & xkeyscore espionage technology | |
Sénécal | The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet | |
Thiyagu et al. | Cyber safety and security education | |
Sodhi | Social Media Law & Cybercrime | |
Perova | Creating guidelines and best practices against phishing and ransomware attacks for healthcare personnel | |
Ezeji | Emerging technologies and cyber-crime: strategies for mitigating cyber-crime and misinformation on social media and cyber systems | |
Ajayi | Internet Technologies and Cybersecurity Law in Nigeria | |
Tanti | Study of Phishing Attack and their Prevention Techniques | |
Khan et al. | What is Mobile Phishing and How to Detect it | |
Kalajžić | Cybersecurity-the threat of social engineering | |
Roddel | The Ultimate Guide to Internet Safety Second Edition |