Author:
Chawla Rakesh Kumar,Sodhi J. S.,Singh Triveni
Publisher
Springer Nature Singapore
Reference56 articles.
1. Wilcox H, Bhattacharya M (2015) Countering social engineering through social media: an enterprise security perspective
2. Costa LPDS, Figueira ACR (2017) Political risk and internationalization of enterprises: A literature review
3. Jansson B (2011) Becoming an effective policy advocate: from policy practice to social
justice. Belmont, CL: Brooks/Cole
4. Hadnagy C, Aharoni M, O’Gorman J (2010) Social engineering capture the flag results. In: Proceedings of the Defcon 18, Las Vegas, NV, USA
5. Ghafir I, Prenosil V, Alhejailan A, Hammoudeh M (2016) Social engineering attack strategies and defence approaches. In: Proceedings of the 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Austria, 22–24 August 2016, pp 145–149
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献