Author:
Achary Rathnakar,Shelke Chetan J.
Publisher
Springer Nature Singapore
Reference17 articles.
1. Mouton, F., Leenen, L., & Venter, H. S. (2015). Social engineering attack detection model: Seadmv2. In 2015 International Conference on Cyberworlds (CW) (pp. 216–223).
2. Carlander-Reuterfelt Gallo, M. (2020). Estimating human resilience to social engineering attacks through computer configuration data. Examensarbete Inom Teknik, Grundnivå, 15 HP Stockholm, Sverige 2020.1
3. Sawa, Y., Bhakta, R., Harris, I. G., & Hadnagy, C. (2016). Detection of social engineering attacks through natural language processing of conversations. In 2016 IEEE Tenth International Conference on Semantic Computing (ICSC) (pp. 262–265)2
4. Peng, T., Harris, I., & Sawa, Y. (2018). Detecting phishing attacks using natural language processing and machine learning. In 2018 IEEE 12th International Conference on Semantic Computing (ICSC) (pp. 300–301).3
5. Orgill, G. L., Romney, G. W., Bailey, M. G., & Orgill, P. M. (2004). The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems. In Proceedings of the 5th Conference on Information Technology Education, (pp. 177–181). ACM, 11.