Search

Your search keyword '"SOCIAL engineering (Fraud)"' showing total 542 results

Search Constraints

Start Over You searched for: Descriptor "SOCIAL engineering (Fraud)" Remove constraint Descriptor: "SOCIAL engineering (Fraud)" Publication Type Academic Journals Remove constraint Publication Type: Academic Journals
542 results on '"SOCIAL engineering (Fraud)"'

Search Results

1. Beyond Technical Barriers: A Multidimensional Conceptual Framework for Understanding and Countering Cyber Scam Susceptibility.

2. Uso responsable de Internet y seguridad digital: revisión sistemática de programas educativos.

3. Security, Privacy, and Surveillance in Cyberspace: Organizational Science Concerns and Contributions.

4. Racialized Railway Mobilities: Repression and Resistance in the Anglophone South African Short Story During the Drum Decade.

5. Procedural fairness in ethnic-cultural decision-making: Benefits, processes and minority and majority group perspectives.

6. On emergent mobile phone-based social engineering cyberattacks in developing countries: The case of the Zambian ICT sector.

7. التشكيلات الحديثةللمقاومة في الضفةالغربية: بين الكتيبة والعرين.

8. DeepEPhishNet: a deep learning framework for email phishing detection using word embedding algorithms.

9. Social Engineering Awareness in ODLS: A Survey on Human Vulnerabilities in Cybersecurity.

10. A holistic qualitative exploration on the perception of scams, scam techniques and effectiveness of anti-scam campaigns in Malaysia.

11. The power of data: Transforming compliance with anti-money laundering measures in domestic and cross-border payments.

12. Developing and implementing social engineering-prevention policies: a qualitative study.

13. XAI-PhD: Fortifying Trust of Phishing URL Detection Empowered by Shapley Additive Explanations.

14. Evidence-based social science: why, what, and future implications.

15. Jijiji, Jajaja, Sabotaje y Campaña Sucia: WhatsApp en las Elecciones Presidenciales Chilenas de 2021.

16. A novel deep learning model-based optimization algorithm for text message spam detection.

17. Toward a Hybrid Approach Combining Deep Learning and Case-Based Reasoning for Phishing Email Detection.

18. Telling a Scientific Story and Governing the Population: the Kallikak Story and the Historical Mutations of the Eugenic Discourse.

19. A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords.

20. Leveraging history to invoke nationalism: from the annals of history to social engineering of present and future in Hindi cinema.

21. Engineering concepts by engineering social norms: solving the implementation challenge.

22. Aspek Pelindungan Hukum Atas Data Pribadi Nasabah pada Penyelenggaraan Layanan Mobile Banking pada PT. Bank Rakyat Indonesia Cabang Stabat.

23. A BIZTONSÁG MEGJELENÉSE A HUMÁN TUDOMÁNYOKBAN (2. RÉSZ).

24. From Humble Beginnings: How the CISO Role Has Evolved.

25. Phishing Attacks Detection Using Ensemble Machine Learning Algorithms.

26. Exploiting vulnerabilities.

27. Fintech Fraud Detection and Prevention.

28. WHO INVENTED THE SO-CALLED "MOLDAVIAN LANGUAGE"? THE OBJECTIVES AND THE PERPETRATORS BEHIND THE INVENTION AND WEAPONIZATION OF THE SO-CALLED "MOLDAVIAN" AND "VLACH" LANGUAGES.

29. Book Review: A Social Philosophy of Science: An Introduction.

31. Using machine learning algorithms to predict individuals' tendency to be victim of social engineering attacks.

32. A robust approach to authorship verification using siamese deep learning: application in phishing email detection.

33. DEVELOPMENT OF A MODEL OF THE INFORMATION AND ANALYTICAL SYSTEM FOR MAKING DECISIONS ON DETECTING FAILURES OF INFORMATION TRANSMISSION CHANNELS.

34. Cybercrime Intention Recognition: A Systematic Literature Review.

35. An Extension of Small Business Cybersecurity Into the Classroom and Community.

36. User Susceptibility to Malicious Push Notifications in Augmented Reality at the Workplace.

37. The Weaponization of Artificial Intelligence in Cybersecurity: A Systematic Review.

38. Rural social engineering: reordering the countryside in decolonising India and Malaysia (1947–60).

39. The Ancient City of Giddan/Eddana (Anqa, Iraq), the "Forgotten Twin" of Dura-Europos.

40. A Cybersecurity Awareness Model for the Protection of Saudi Students from Social Media Attacks.

41. Imperial algorithms: Contemporary manifestations of racism and colonialism.

42. Defense for Advanced Persistent Threat with Inadvertent and Malicious Insider Threats.

43. DEVELOPMENT OF THE SOCIOCYBERPHYSICAL SYSTEMS` MULTI-CONTOUR SECURITY METHODOLOGY.

45. An Ensemble Classification Model for Phishing Mail Detection.

46. The counterinsurgent imagination: a new intellectual history: by Joseph MacKay, New Delhi, Cambridge University Press, 2023, 310 pp., ₹2714 (paperback), ISBN: 978-1-009-22582-3.

47. Dictionary List Creation using Web Scrapping and Password Cracking.

48. Evolutionary Approach for DISCO Profit Maximization by Optimal Planning of Distributed Generators and Energy Storage Systems in Active Distribution Networks.

49. Social Media in the Digital Age: A Comprehensive Review of Impacts, Challenges and Cybercrime †.

50. The Convergence of Islamic Law and Technology in The Enforcement of Citizen's Constitutional Rights in The Era Society 5.0.

Catalog

Books, media, physical & digital resources