Search

Your search keyword '"SOCIAL engineering (Fraud)"' showing total 156 results

Search Constraints

Start Over You searched for: Descriptor "SOCIAL engineering (Fraud)" Remove constraint Descriptor: "SOCIAL engineering (Fraud)" Topic internet security Remove constraint Topic: internet security
156 results on '"SOCIAL engineering (Fraud)"'

Search Results

1. Cybersecurity: Safeguarding the digital landscape.

2. The Weaponization of Artificial Intelligence in Cybersecurity: A Systematic Review.

3. A Cybersecurity Awareness Model for the Protection of Saudi Students from Social Media Attacks.

4. MELTDOWN IN THE MAKING: WHY FOUNDRY CYBERSECURITY CAN'T BE CAST ASIDE.

5. Social Engineering Attack-Defense Strategies Based on Reinforcement Learning.

6. Survey on Deep Learning Approaches for Detection of Email Security Threat.

7. On the Difference between Security and Safety.

8. Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures—A Perspective on the Greek Landscape.

9. ANALYSIS OF THE LEVEL OF AWARENESS AMONG THE ACADEMIC COMMUNITY IN THE FIELD OF CYBERSECURITY.

10. Machine learning and cyber security.

11. Intelligent phishing website detection using machine learning.

12. CYBERSECURITY MANAGEMENT - CURRENT STATE AND DIRECTIONS OF CHANGE.

13. الأمن السبيراني وحماية الأنظمة المعلوماتية

14. Identification of new threats to the national security of the state.

15. RASCLS VS. RANSOMWARE: A COUNTERINTELLIGENCE FRAMEWORK FOR CYBERSECURITY EDUCATION.

16. Central Bank Digital Currency, Cyber Security & Privacy.

17. SPEAR-PHISHING AND ITS SPECIFICS WITHIN SOCIAL ENGINEERING.

18. Security Networks as an Effective Means to Reduce Spear Phishing Susceptibility.

20. Securing data privacy and cybersecurity in today's tech landscape.

21. Cybersecurity Test Bed for Smart Contracts.

22. Lost and found: testing cybersecurity preparedness at a university.

23. Accounting Ethics and Cybersecurity: Finance leaders who collaborate with cybersecurity personnel increase their organization's effectiveness in dealing with cyber threats.

24. Gender Detection via Voice Using Artificial Intelligence Algorithms.

25. An intelligent cyber security phishing detection system using deep learning techniques.

26. La seguridad en el ciberespacio desde una perspectiva sociocultural.

27. Cyber security threats: A never-ending challenge for e-commerce.

28. Work Experience as a Factor in Cyber-Security Risk Awareness: A Survey Study with University Students.

29. Leveraging Contractive Autoencoder with Fuzzy Lattice Reasoning and Resilient KNN for Detection of multi-level Bitcoin Ransomware.

30. The Effect of Using Social Engineering for Cybersecurity on the Internet of Things Environment.

32. THINGS TO KNOW ABOUT CYBERSECURITY TODAY.

33. Research on the Effectiveness of Cyber Security Awareness in ICS Risk Assessment Frameworks.

34. GeneratingQuality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy.

35. Researchers Submit Patent Application, "Method And System For Training Non-Technical Users On Highly Complex Cyber Security Topics", for Approval (USPTO 20240221534).

36. Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks.

37. Organizational science and cybersecurity: abundant opportunities for research at the interface.

38. Exploiting personality traits in social engineering attacks.

39. Hacking Humans? Social Engineering and the Construction of the "Deficient User" in Cybersecurity Discourses.

40. Tackling the challenge of cybersecurity.

41. Cyber combat.

42. A social engineering támadások megelőzésének lehetőségei.

43. Social engineering in cybersecurity: a domain ontology and knowledge graph application examples.

44. 8 Cybersecurity Best Practices to Implement.

45. Staying dry: How to avoid cybersecurity squalls in a cloud migration.

47. Social Engineering and the Dangers of Phishing.

48. CySecEscape 2.0--A Virtual Escape Room To Raise Cybersecurity Awareness.

49. CYBERSECURITY AS A FUNDAMENTAL ELEMENT OF THE DIGITAL ECONOMY.

50. Cybersecurity.

Catalog

Books, media, physical & digital resources