Search

Your search keyword '"SOCIAL engineering (Fraud)"' showing total 410 results

Search Constraints

Start Over You searched for: Descriptor "SOCIAL engineering (Fraud)" Remove constraint Descriptor: "SOCIAL engineering (Fraud)" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
410 results on '"SOCIAL engineering (Fraud)"'

Search Results

1. DeepEPhishNet: a deep learning framework for email phishing detection using word embedding algorithms.

2. XAI-PhD: Fortifying Trust of Phishing URL Detection Empowered by Shapley Additive Explanations.

3. A novel deep learning model-based optimization algorithm for text message spam detection.

4. Toward a Hybrid Approach Combining Deep Learning and Case-Based Reasoning for Phishing Email Detection.

5. A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords.

6. WHO INVENTED THE SO-CALLED "MOLDAVIAN LANGUAGE"? THE OBJECTIVES AND THE PERPETRATORS BEHIND THE INVENTION AND WEAPONIZATION OF THE SO-CALLED "MOLDAVIAN" AND "VLACH" LANGUAGES.

7. TOWARD A MORE FANTASTIC PLASTIC.

8. RWANDA.

9. BFSI and Security: Will The Wine Glass Stay?

10. Conquering the Security Trifecta: Top CISO Concerns and some actionable recommendations.

11. A robust approach to authorship verification using siamese deep learning: application in phishing email detection.

12. Cybercrime Intention Recognition: A Systematic Literature Review.

13. The Weaponization of Artificial Intelligence in Cybersecurity: A Systematic Review.

14. Tom Clancy's Splinter Cell: Blacklist.

15. HOW DO YOU KNOW IF YOU'VE BEEN.

16. Revolutionizing banking security.

17. HOW DO YOU KNOW IF YOU'VE BEEN HACKED?

18. Adopt the Best Practices for Software Development.

19. Golden Eggs.

20. On both sides of the law.

21. Hacker’s toolkit.

22. The Cost of Inaction: Exploring the Consequences of Ignoring IIoT Security Risks.

24. An Ensemble Classification Model for Phishing Mail Detection.

25. Evolutionary Approach for DISCO Profit Maximization by Optimal Planning of Distributed Generators and Energy Storage Systems in Active Distribution Networks.

26. Reactualising the problem of social engineering and digital security.

27. QUEER AND ETHNICITY IN MINSK, 1952: BELARUSIAN READING OF KASPARS IRBE'S DIARY.

28. “The Ghostly Terrors of the Nursery”: Joseph Sheridan Le Fanu and Childhood Trauma.

29. Bibliometric Analysis of the Research Landscape in Human-Computer Interaction in Ibero-America.

30. An application for predicting phishing attacks: A case of implementing a support vector machine learning model.

31. Enhancing LightGBM for Industrial Fault Warning: An Innovative Hybrid Algorithm.

32. BEHIND "DIGITAL PUBLIC INFRASTRUCTURE" FOR GLOBAL CONTROL: Global elites are rushing forward with technologies that will give them a level of control over humanity that would have been unimaginable even a decade ago.

33. How to protect your online gaming accounts?

34. PROTECT YOUR SYSTEMS.

35. MELTDOWN IN THE MAKING: WHY FOUNDRY CYBERSECURITY CAN'T BE CAST ASIDE.

36. Analytics of Phishing Attacks Using Machine Learning.

37. Jenseits der pädagogischen Illusion? Historischvergleichende Überlegungen zur Wirkungsgeschichte der moralischen Bildung von Kindern und Jugendlichen.

38. Modelling an Efficient URL Phishing Detection Approach Based on a Dense Network Model.

39. Social Engineering Attack-Defense Strategies Based on Reinforcement Learning.

40. Federated and Transfer Learning Applications.

41. Protective Factors for Developing Cognitive Skills against Cyberattacks.

42. The Security Industry Navigates Megatrends for Sustainable Growth.

43. GADGET GURU.

44. On the Difference between Security and Safety.

45. Autistic and abroad: An AuDHD researcher recounts the highs and lows of relocating from the United States to Germany for his postdoc.

46. Cold War Colonialism and Suburban Innocence.

48. FORTIFYING THE DIGITAL REALM.

49. BIG LITTLE LIES.

Catalog

Books, media, physical & digital resources