Social engineering in cybersecurity: Effect mechanisms, human vulnerabilities and attack methods Z Wang, H Zhu, L Sun Ieee Access 9, 11895-11910, 2021 | 177 | 2021 |
Defining Social Engineering in Cybersecurity Z Wang, L Sun, H Zhu IEEE Access 8, 85094-85115, 2020 | 167 | 2020 |
Social Engineering in Cybersecurity: A Domain Ontology and Knowledge Graph Application Examples Z Wang, H Zhu, P Liu, L Sun Cybersecurity 4, 31, 2021 | 66 | 2021 |
Threat detection for general social engineering attack using machine learning techniques Z Wang, Y Ren, H Zhu, L Sun arXiv preprint arXiv:2203.07933, 2022 | 15 | 2022 |
Multi-features based semantic augmentation networks for named entity recognition in threat intelligence P Liu, H Li, Z Wang, J Liu, Y Ren, H Zhu 2022 26th International Conference on Pattern Recognition (ICPR), 1557-1563, 2022 | 14 | 2022 |
Quantitative risk assessment of industrial control systems based on attack-tree and CVSS Z Wang, Q Wei, W Liu Application Research of Computers 33 (12), 3785-3790, 2016 | 8* | 2016 |
SEIGuard: An Authentication-simplified and Deceptive Scheme to Protect Server-side Social Engineering Information Against Brute-force Attacks Z Wang, J Peng, H Zhu, L Sun arXiv preprint arXiv:2108.06529, 2021 | 1 | 2021 |
社工概念演化分析 王作广, 朱红松, 孙利民 信息安全学报 6 (2), 12-29, 2021 | | 2021 |