Search

Your search keyword '"SOCIAL engineering (Fraud)"' showing total 1,140 results

Search Constraints

Start Over You searched for: Descriptor "SOCIAL engineering (Fraud)" Remove constraint Descriptor: "SOCIAL engineering (Fraud)"
1,140 results on '"SOCIAL engineering (Fraud)"'

Search Results

1. Masters of War.

2. DeepEPhishNet: a deep learning framework for email phishing detection using word embedding algorithms.

3. XAI-PhD: Fortifying Trust of Phishing URL Detection Empowered by Shapley Additive Explanations.

4. Evidence-based social science: why, what, and future implications.

5. A novel deep learning model-based optimization algorithm for text message spam detection.

6. Toward a Hybrid Approach Combining Deep Learning and Case-Based Reasoning for Phishing Email Detection.

7. Telling a Scientific Story and Governing the Population: the Kallikak Story and the Historical Mutations of the Eugenic Discourse.

8. A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords.

9. Leveraging history to invoke nationalism: from the annals of history to social engineering of present and future in Hindi cinema.

10. Engineering concepts by engineering social norms: solving the implementation challenge.

11. Phishing Attacks Detection Using Ensemble Machine Learning Algorithms.

12. Exploiting vulnerabilities.

13. WHO INVENTED THE SO-CALLED "MOLDAVIAN LANGUAGE"? THE OBJECTIVES AND THE PERPETRATORS BEHIND THE INVENTION AND WEAPONIZATION OF THE SO-CALLED "MOLDAVIAN" AND "VLACH" LANGUAGES.

14. From Humble Beginnings: How the CISO Role Has Evolved.

15. Cybersecurity: Safeguarding the digital landscape.

16. The challenges of cyber space with crime-as-a-service (CAAS) to amateur attackers.

17. TOWARD A MORE FANTASTIC PLASTIC.

18. RWANDA.

19. Conquering the Security Trifecta: Top CISO Concerns and some actionable recommendations.

20. BFSI and Security: Will The Wine Glass Stay?

21. HACKING HUMANS.

22. Book Review: A Social Philosophy of Science: An Introduction.

23. A robust approach to authorship verification using siamese deep learning: application in phishing email detection.

24. Using machine learning algorithms to predict individuals' tendency to be victim of social engineering attacks.

25. DEVELOPMENT OF A MODEL OF THE INFORMATION AND ANALYTICAL SYSTEM FOR MAKING DECISIONS ON DETECTING FAILURES OF INFORMATION TRANSMISSION CHANNELS.

26. Cybercrime Intention Recognition: A Systematic Literature Review.

27. User Susceptibility to Malicious Push Notifications in Augmented Reality at the Workplace.

28. The Weaponization of Artificial Intelligence in Cybersecurity: A Systematic Review.

29. The Ancient City of Giddan/Eddana (Anqa, Iraq), the "Forgotten Twin" of Dura-Europos.

30. A Cybersecurity Awareness Model for the Protection of Saudi Students from Social Media Attacks.

31. Social engineering design based on community groups around the site on the plan for the development of a nuclear power plant in West Kalimantan.

32. Wannacry ransomware attack: The enemy lies under your blanket.

33. Web-based biometric authentication system for web applications (WBAS).

34. Social engineering: Methodologies to counter computer attacks on the web. Case: Barrio 26 de Septiembre, Portoviejo, Ecuador.

35. Tom Clancy's Splinter Cell: Blacklist.

36. HOW DO YOU KNOW IF YOU'VE BEEN.

37. Opening to the Joy of Work.

38. 4 Types of Gen AI Risk and How to Mitigate Them.

39. Adopt the Best Practices for Software Development.

40. Revolutionizing banking security.

41. HOW DO YOU KNOW IF YOU'VE BEEN HACKED?

42. HOW DO YOU KNOW IF YOU’VE BEEN HACKED?

43. A Guide to Safeguarding Seniors from CyberThreats.

44. Golden Eggs.

45. The Cost of Inaction: Exploring the Consequences of Ignoring IIoT Security Risks.

46. Hacker’s toolkit.

47. On both sides of the law.

48. Imperial algorithms: Contemporary manifestations of racism and colonialism.

49. Defense for Advanced Persistent Threat with Inadvertent and Malicious Insider Threats.

50. DEVELOPMENT OF THE SOCIOCYBERPHYSICAL SYSTEMS` MULTI-CONTOUR SECURITY METHODOLOGY.

Catalog

Books, media, physical & digital resources