Author:
Subbalakshmi Chatti,Pareek Piyush Kumar,Sayal Rishi
Reference48 articles.
1. Kalnin SR, Purin SJ, Alksnis G (2017) Security evaluation of wireless network access points. Appl Comput Syst 21:38–45
2. Pokrovskaia N (2017) Social engineering and digital technologies for the security of the social capital’ development. In: Proceedings of the international conference of quality management, transport and information security. Petersburg, Russia, pp 16–19, 24–30 Sept 2017
3. Aroyo AM, Rea F, Sandini G, Sciutti A (2018) Trust and social engineering in human robot interaction: will a robot make you disclose sensitive information, conform to its recommendations or gamble? IEEE Robot Autom Lett 3:3701–3708
4. Arana M (2017) How much does a cyberattack cost companies?. Open Data Secur 1–4
5. Chargo M (2018) You’ve been hacked: how to better incentivize corporations to protect consumers’ data. Trans Tenn J Bus Law 20:115–143
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献