Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Social engineering attacks: A survey
F Salahdine, N Kaabouch - Future internet, 2019 - mdpi.com
The advancements in digital communication technology have made communication
between humans more accessible and instant. However, personal and sensitive information …
between humans more accessible and instant. However, personal and sensitive information …
Smart home security: challenges, issues and solutions at different IoT layers
Abstract The Internet of Things is a rapidly evolving technology in which interconnected
computing devices and sensors share data over the network to decipher different problems …
computing devices and sensors share data over the network to decipher different problems …
Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues
H Aldawood, G Skinner - Future internet, 2019 - mdpi.com
The idea and perception of good cyber security protection remains at the forefront of many
organizations' information and communication technology strategy and investment …
organizations' information and communication technology strategy and investment …
Defining social engineering in cybersecurity
Social engineering has posed a serious security threat to infrastructure, user, data and
operations of cyberspace. Nevertheless, there are many conceptual deficiencies (such as …
operations of cyberspace. Nevertheless, there are many conceptual deficiencies (such as …
Security threats to critical infrastructure: the human factor
In the twenty-first century, globalisation made corporate boundaries invisible and difficult to
manage. This new macroeconomic transformation caused by globalisation introduced new …
manage. This new macroeconomic transformation caused by globalisation introduced new …
Educating and raising awareness on cyber security social engineering: A literature review
H Aldawood, G Skinner - 2018 IEEE international conference …, 2018 - ieeexplore.ieee.org
Social engineering, due in part to the increasing popularity and advancements in
information technology and ubiquity of devices, has emerged as one of the most challenging …
information technology and ubiquity of devices, has emerged as one of the most challenging …
A systematic security assessment and review of internet of things in the context of authentication
Abstract The Internet of Things is emerging globally as an intriguing trend expected to
connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation …
connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation …
Social engineering attacks during the COVID-19 pandemic
S Venkatesha, KR Reddy, BR Chandavarkar - SN computer science, 2021 - Springer
The prevailing conditions surrounding the COVID-19 pandemic has shifted a variety of
everyday activities onto platforms on the Internet. This has led to an increase in the number …
everyday activities onto platforms on the Internet. This has led to an increase in the number …
Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot
Attribute based encryption (ABE) is an encrypted access control mechanism that ensures
efficient data sharing among dynamic group of users. Nevertheless, this encryption …
efficient data sharing among dynamic group of users. Nevertheless, this encryption …
Internet-based social engineering psychology, attacks, and defenses: A survey
TT Longtchi, RM Rodriguez, L Al-Shawaf… - Proceedings of the …, 2024 - ieeexplore.ieee.org
Internet-based social engineering (SE) attacks are a major cyber threat. These attacks often
serve as the first step in a sophisticated sequence of attacks that target, among other things …
serve as the first step in a sophisticated sequence of attacks that target, among other things …