Search

Your search keyword '"SOCIAL engineering (Fraud)"' showing total 428 results

Search Constraints

Start Over You searched for: Descriptor "SOCIAL engineering (Fraud)" Remove constraint Descriptor: "SOCIAL engineering (Fraud)" Search Limiters Full Text Remove constraint Search Limiters: Full Text
428 results on '"SOCIAL engineering (Fraud)"'

Search Results

1. Uso responsable de Internet y seguridad digital: revisión sistemática de programas educativos.

2. DeepEPhishNet: a deep learning framework for email phishing detection using word embedding algorithms.

3. Tom Clancy's Splinter Cell: Blacklist.

4. 10 tips to help avoid wire fraud scams.

5. TOWARD A MORE FANTASTIC PLASTIC.

6. XAI-PhD: Fortifying Trust of Phishing URL Detection Empowered by Shapley Additive Explanations.

7. Jijiji, Jajaja, Sabotaje y Campaña Sucia: WhatsApp en las Elecciones Presidenciales Chilenas de 2021.

8. A novel deep learning model-based optimization algorithm for text message spam detection.

9. Toward a Hybrid Approach Combining Deep Learning and Case-Based Reasoning for Phishing Email Detection.

10. A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords.

11. WHO INVENTED THE SO-CALLED "MOLDAVIAN LANGUAGE"? THE OBJECTIVES AND THE PERPETRATORS BEHIND THE INVENTION AND WEAPONIZATION OF THE SO-CALLED "MOLDAVIAN" AND "VLACH" LANGUAGES.

12. A robust approach to authorship verification using siamese deep learning: application in phishing email detection.

13. RWANDA.

14. Conquering the Security Trifecta: Top CISO Concerns and some actionable recommendations.

15. BFSI and Security: Will The Wine Glass Stay?

16. HOW DO YOU KNOW IF YOU'VE BEEN.

17. Cybercrime Intention Recognition: A Systematic Literature Review.

18. The Weaponization of Artificial Intelligence in Cybersecurity: A Systematic Review.

19. Navigating The AI Cybersecurity Maze.

20. Revolutionizing banking security.

21. Adopt the Best Practices for Software Development.

22. HOW DO YOU KNOW IF YOU'VE BEEN HACKED?

23. Golden Eggs.

24. On both sides of the law.

25. The Cost of Inaction: Exploring the Consequences of Ignoring IIoT Security Risks.

26. Hacker’s toolkit.

27. PROTECT YOUR SYSTEMS.

29. An Ensemble Classification Model for Phishing Mail Detection.

30. Evolutionary Approach for DISCO Profit Maximization by Optimal Planning of Distributed Generators and Energy Storage Systems in Active Distribution Networks.

31. Social Media in the Digital Age: A Comprehensive Review of Impacts, Challenges and Cybercrime †.

32. QUEER AND ETHNICITY IN MINSK, 1952: BELARUSIAN READING OF KASPARS IRBE'S DIARY.

33. CYBERSECURITY IN TOURISM AND HOSPITALITY MANAGEMENT RESEARCH: CURRENT ISSUES, TRENDS, AND AN AGENDA FOR FUTURE RESEARCH.

34. Reactualising the problem of social engineering and digital security.

35. “The Ghostly Terrors of the Nursery”: Joseph Sheridan Le Fanu and Childhood Trauma.

36. Bibliometric Analysis of the Research Landscape in Human-Computer Interaction in Ibero-America.

37. Enhancing LightGBM for Industrial Fault Warning: An Innovative Hybrid Algorithm.

38. An application for predicting phishing attacks: A case of implementing a support vector machine learning model.

39. Analytics of Phishing Attacks Using Machine Learning.

40. Jenseits der pädagogischen Illusion? Historischvergleichende Überlegungen zur Wirkungsgeschichte der moralischen Bildung von Kindern und Jugendlichen.

41. UNDER COVERED.

42. BEHIND "DIGITAL PUBLIC INFRASTRUCTURE" FOR GLOBAL CONTROL: Global elites are rushing forward with technologies that will give them a level of control over humanity that would have been unimaginable even a decade ago.

43. How to protect your online gaming accounts?

44. GADGET GURU.

45. On the Difference between Security and Safety.

46. Autistic and abroad: An AuDHD researcher recounts the highs and lows of relocating from the United States to Germany for his postdoc.

47. MELTDOWN IN THE MAKING: WHY FOUNDRY CYBERSECURITY CAN'T BE CAST ASIDE.

49. Modelling an Efficient URL Phishing Detection Approach Based on a Dense Network Model.

50. Social Engineering Attack-Defense Strategies Based on Reinforcement Learning.

Catalog

Books, media, physical & digital resources