Search

Your search keyword '"SOCIAL engineering (Fraud)"' showing total 9 results

Search Constraints

Start Over You searched for: Descriptor "SOCIAL engineering (Fraud)" Remove constraint Descriptor: "SOCIAL engineering (Fraud)" Journal aip conference proceedings Remove constraint Journal: aip conference proceedings
9 results on '"SOCIAL engineering (Fraud)"'

Search Results

1. Cybersecurity: Safeguarding the digital landscape.

2. The challenges of cyber space with crime-as-a-service (CAAS) to amateur attackers.

3. Social engineering design based on community groups around the site on the plan for the development of a nuclear power plant in West Kalimantan.

4. Wannacry ransomware attack: The enemy lies under your blanket.

5. Web-based biometric authentication system for web applications (WBAS).

6. Social engineering: Methodologies to counter computer attacks on the web. Case: Barrio 26 de Septiembre, Portoviejo, Ecuador.

7. Real time malicious bot detection for Twitter.

9. Social engineering (SoE) attacks towards network security in higher learning institute: The partial least squares path modeling approach.

Catalog

Books, media, physical & digital resources