Advanced social engineering attacks
Top Cited Papers
- 1 June 2015
- journal article
- Published by Elsevier BV in Journal of Information Security and Applications
- Vol. 22, 113-122
- https://doi.org/10.1016/j.jisa.2014.09.005
Abstract
No abstract availableKeywords
Funding Information
- Austrian Science Fund (P 26289-N23)
- COMET K1
- FFG – Austrian Research Promotion Agency
This publication has 7 references indexed in Scilit:
- The Human Element of Information SecurityIEEE Security & Privacy, 2012
- BYOD: Security and Privacy ConsiderationsIT Professional, 2012
- Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for SpamIEEE Internet Computing, 2011
- The psychology of password management: a tradeoff between security and convenienceBehaviour & Information Technology, 2010
- Using Cartoons to Teach Internet SecurityCryptologia, 2008
- Social phishingCommunications of the ACM, 2007
- Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection TrainingLecture Notes in Computer Science, 2004