1. Mouton, F., Leenen, L., Venter, H.S.: Social engineering attack examples, templates and scenarios. In: Computers and Security (2016)
2. Hadnagy, C.: Social Engineering: The Art of Human Hacking, 1st edn. Wiley Publishing Inc., Indianapolis, Indiana (2011)
3. Mataracioglu, T., Ozkan, S., Hackney, R.: Towards a security lifecycle model against social engineering attacks: SLM-SEA. In: Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, pp. 1–10 (2013)
4. Hadnagy, C.J., Aharoni, M., O’Gorman, J.: Social engineering capture the flag results. In: The Defcon 18 Social Engineering CTF Report. http://www.social-engineer.org/resources/sectf/Social-Engineer_CTF_Report.pdf . Accessed 02 Aug 2010
5. Bican, C.: Social Engineering Attacks. TUBITAK UEKAE—National Gate of Information Security. http://www.bilgiguvenligi.gov.tr/teknik-yazilar-kategorisi/sosyal-muhendislik-saldirilari.html?Itemid=6 . Accessed May 2008