Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues

H Aldawood, G Skinner - Future internet, 2019 - mdpi.com
The idea and perception of good cyber security protection remains at the forefront of many
organizations' information and communication technology strategy and investment …

Phishing environments, techniques, and countermeasures: A survey

A Aleroud, L Zhou - Computers & Security, 2017 - Elsevier
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …

Cognitive triaging of phishing attacks

A Van Der Heijden, L Allodi - 28th USENIX Security Symposium …, 2019 - usenix.org
In this paper we employ quantitative measurements of cognitive vulnerability triggers in
phishing emails to predict the degree of success of an attack. To achieve this we rely on the …

Social engineering: IE based model of human weakness for attack and defense investigations

W Fan, L Kevin, R Rong - IJ Computer Network and Information Security, 2017 - oa.upm.es
Social engineering is the attack aimed to manipulate dupe to divulge sensitive information or
take actions to help the adversary bypass the secure perimeter in front of the information …

SEADer++: social engineering attack detection in online environments using machine learning

M Lansley, F Mouton, S Kapetanakis… - Journal of Information …, 2020 - Taylor & Francis
Social engineering attacks are one of the most well-known and easiest to apply attacks in
the cybersecurity domain. Research has shown that the majority of attacks against computer …

Measuring awareness of social engineering in the educational sector in the kingdom of Saudi Arabia

MH Alsulami, FD Alharbi, HM Almutairi, BS Almutairi… - Information, 2021 - mdpi.com
Social engineering is one of the most inventive methods of gaining unauthorized access to
information systems and obtaining sensitive information. This type of cybersecurity threat …

Detection of social engineering attacks through natural language processing of conversations

Y Sawa, R Bhakta, IG Harris… - 2016 IEEE Tenth …, 2016 - ieeexplore.ieee.org
As computer security approaches improve, social engineering attacks have become more
prevalent because they exploit human vulnerabilities which are hard to automatically …

Social engineering attack detection model: Seadmv2

F Mouton, L Leenen, HS Venter - … International Conference on …, 2015 - ieeexplore.ieee.org
Information security is a fast-growing discipline, and therefore the effectiveness of security
measures to protect sensitive information needs to be increased. Since people are generally …

An approach to estimating of criticality of social engineering attacks traces

A Khlobystova, M Abramov, A Tulupyev - International Conference on …, 2019 - Springer
In this article we propose to consider the trajectories of social engineering attacks, which are
the most critical from the point of view of the expected damage to the organization, and not …

Towards an automated recognition system for chat-based social engineering attacks in enterprise environments

N Tsinganos, G Sakellariou, P Fouliras… - Proceedings of the 13th …, 2018 - dl.acm.org
Increase in usage of electronic communication tools (email, IM, Skype, etc.) in enterprise
environments has created new attack vectors for social engineers. Billions of people are …