Author:
Siadati Hossein,Nguyen Toan,Gupta Payas,Jakobsson Markus,Memon Nasir
Publisher
Springer International Publishing
Reference51 articles.
1. S. Abraham, I. Chengalur-Smith, An overview of social engineering malware: trends, tactics, and implications. Technol. Soc. 32(3), 183–196 (2010)
2. Z. Ahmadian, S. Salimi, A. Salahi, New attacks on UMTS network access, in Wireless Telecommunications Symposium, 2009. WTS 2009 (IEEE, Piscataway, 2009), pp. 1–6
3. D. Akhawe, A.P. Felt, Alice in Warningland: a large-scale field study of browser security warning effectiveness, in Usenix Security (2013), pp. 257–272
4. H. Almuhimedi, A.P. Felt, R.W. Reeder, S. Consolvo, Your reputation precedes you: history, reputation, and the chrome malware warning, in Proceedings of the Symposium on Usable Privacy and Security, SOUPS (2014), pp. 113–128
5. M. Balduzzi, P. Gupta, L. Gu, D. Gao, M. Ahamad, Mobipot: understanding mobile telephony threats with honeycards, in Proceedings of the 11th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS ’16, New York (2016) ACM.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Credit Cards Theft Using Social Engineering over WhatsApp: A Survey Study;2021 22nd International Arab Conference on Information Technology (ACIT);2021-12-21