Search

Your search keyword '"SOCIAL engineering (Fraud)"' showing total 1,233 results

Search Constraints

Start Over You searched for: Descriptor "SOCIAL engineering (Fraud)" Remove constraint Descriptor: "SOCIAL engineering (Fraud)" Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years
1,233 results on '"SOCIAL engineering (Fraud)"'

Search Results

1. Masters of War.

2. Beyond Technical Barriers: A Multidimensional Conceptual Framework for Understanding and Countering Cyber Scam Susceptibility.

3. Uso responsable de Internet y seguridad digital: revisión sistemática de programas educativos.

4. Security, Privacy, and Surveillance in Cyberspace: Organizational Science Concerns and Contributions.

5. Racialized Railway Mobilities: Repression and Resistance in the Anglophone South African Short Story During the Drum Decade.

6. Procedural fairness in ethnic-cultural decision-making: Benefits, processes and minority and majority group perspectives.

7. On emergent mobile phone-based social engineering cyberattacks in developing countries: The case of the Zambian ICT sector.

8. التشكيلات الحديثةللمقاومة في الضفةالغربية: بين الكتيبة والعرين.

9. DeepEPhishNet: a deep learning framework for email phishing detection using word embedding algorithms.

10. Social Engineering Awareness in ODLS: A Survey on Human Vulnerabilities in Cybersecurity.

11. A holistic qualitative exploration on the perception of scams, scam techniques and effectiveness of anti-scam campaigns in Malaysia.

12. The power of data: Transforming compliance with anti-money laundering measures in domestic and cross-border payments.

13. Developing and implementing social engineering-prevention policies: a qualitative study.

14. Analysis of generation Z characters in using social media applications on the internet.

16. Tom Clancy's Splinter Cell: Blacklist.

17. SPOOFIING UNMASKED: Cheating criminals shatter trust.

19. 10 tips to help avoid wire fraud scams.

20. BEWARE: Growing Cyberthreats.

21. TOWARD A MORE FANTASTIC PLASTIC.

22. HACKING HUMANS.

23. XAI-PhD: Fortifying Trust of Phishing URL Detection Empowered by Shapley Additive Explanations.

24. Evidence-based social science: why, what, and future implications.

25. Jijiji, Jajaja, Sabotaje y Campaña Sucia: WhatsApp en las Elecciones Presidenciales Chilenas de 2021.

26. A novel deep learning model-based optimization algorithm for text message spam detection.

27. Toward a Hybrid Approach Combining Deep Learning and Case-Based Reasoning for Phishing Email Detection.

28. Telling a Scientific Story and Governing the Population: the Kallikak Story and the Historical Mutations of the Eugenic Discourse.

29. A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords.

30. Leveraging history to invoke nationalism: from the annals of history to social engineering of present and future in Hindi cinema.

31. Engineering concepts by engineering social norms: solving the implementation challenge.

32. Aspek Pelindungan Hukum Atas Data Pribadi Nasabah pada Penyelenggaraan Layanan Mobile Banking pada PT. Bank Rakyat Indonesia Cabang Stabat.

33. A BIZTONSÁG MEGJELENÉSE A HUMÁN TUDOMÁNYOKBAN (2. RÉSZ).

34. From Humble Beginnings: How the CISO Role Has Evolved.

35. Phishing Attacks Detection Using Ensemble Machine Learning Algorithms.

36. Exploiting vulnerabilities.

37. Fintech Fraud Detection and Prevention.

38. WHO INVENTED THE SO-CALLED "MOLDAVIAN LANGUAGE"? THE OBJECTIVES AND THE PERPETRATORS BEHIND THE INVENTION AND WEAPONIZATION OF THE SO-CALLED "MOLDAVIAN" AND "VLACH" LANGUAGES.

39. Book Review: A Social Philosophy of Science: An Introduction.

41. Using machine learning algorithms to predict individuals' tendency to be victim of social engineering attacks.

42. A robust approach to authorship verification using siamese deep learning: application in phishing email detection.

43. Cybersecurity: Safeguarding the digital landscape.

44. The challenges of cyber space with crime-as-a-service (CAAS) to amateur attackers.

45. RWANDA.

46. Conquering the Security Trifecta: Top CISO Concerns and some actionable recommendations.

47. BFSI and Security: Will The Wine Glass Stay?

48. HOW DO YOU KNOW IF YOU'VE BEEN.

49. Opening to the Joy of Work.

50. DEVELOPMENT OF A MODEL OF THE INFORMATION AND ANALYTICAL SYSTEM FOR MAKING DECISIONS ON DETECTING FAILURES OF INFORMATION TRANSMISSION CHANNELS.

Catalog

Books, media, physical & digital resources