Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Software
Reference77 articles.
1. From information security to cyber security;Von Solms;Comput Secur,2013
2. Technical mapping of the grooming anatomy using machine learning paradigms: An information security approach;Zambrano;IEEE Access,2019
3. Understanding cyberbullying as an information security attack—life cycle modeling;Zambrano;Ann Telecommun,2020
4. Social engineering in cybersecurity: The evolution of a concept;Hatfield;Comput Secur,2018
5. How does grooming fit into social engineering?;Zambrano,2019