Strategies for counteracting social engineering attacks

被引:0
|
作者
Fatima, Rubia [1 ]
Yasin, Affan [1 ]
Liu, Lin [1 ]
Jianmin, Wang [1 ]
机构
[1] Tsinghua University, China, China
来源
Computer Fraud and Security | 2022年 / 2022卷 / 07期
关键词
D O I
10.12968/S1361-3723(22)70583-0
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Priming and warnings are not effective to prevent social engineering attacks
    Junger, M.
    Montoya, L.
    Overink, F. -J.
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2017, 66 : 75 - 87
  • [32] Dissecting Social Engineering Attacks Through the Lenses of Cognition
    Burda, Pavlo
    Allodi, Luca
    Zannone, Nicola
    [J]. 2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2021), 2021, : 149 - 160
  • [33] PERSUADED: Fighting Social Engineering Attacks with a Serious Game
    Aladawy, Dina
    Beckers, Kristian
    Pape, Sebastian
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2018, 11033 : 103 - 118
  • [34] Semantic Analysis of Dialogs to Detect Social Engineering Attacks
    Bhakta, Ram
    Harris, Ian G.
    [J]. 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC), 2015, : 424 - 427
  • [35] A Literature Survey on Social Engineering Attacks: Phishing Attack
    Gupta, Surbhi
    Singhal, Abhishek
    Kapoor, Akanksha
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 537 - 540
  • [36] Detecting and Counteracting Statistical Attacks in Cooperative Spectrum Sensing
    Penna, Federico
    Sun, Yifan
    Dolecek, Lara
    Cabric, Danijela
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2012, 60 (04) : 1806 - 1822
  • [37] Counteracting Adversarial Attacks in Autonomous Driving (Invited Talk)
    Sun, Qi
    Rao, Arjun Ashok
    Yao, Xufeng
    Yu, Bei
    Hu, Shiyan
    [J]. 2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD), 2020,
  • [38] Security Techniques for Counteracting Attacks in Mobile Healthcare Services
    Tupakula, Udaya
    Varadharajan, Vijay
    [J]. 4TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2013) AND THE 3RD INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH), 2013, 21 : 374 - 381
  • [39] STRATEGIES FOR COUNTERACTING RESISTANCE TO ANTIBACTERIAL AGENTS
    GREENWOOD, D
    [J]. JOURNAL OF ANTIMICROBIAL CHEMOTHERAPY, 1986, 18 : 141 - 151
  • [40] Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks
    Tofighi, Mohammad Ali
    Ousat, Behzad
    Zandi, Javad
    Schafir, Esteban
    Kharraz, Amin
    [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2024, 2024, 14828 : 107 - 127