Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A study on the psychology of social engineering-based cyberattacks and existing countermeasures
MA Siddiqi, W Pak, MA Siddiqi - Applied Sciences, 2022 - mdpi.com
As cybersecurity strategies become more robust and challenging, cybercriminals are
mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …
mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …
Social engineering attacks prevention: A systematic literature review
Social engineering is an attack on information security for accessing systems or networks.
Social engineering attacks occur when victims do not recognize methods, models, and …
Social engineering attacks occur when victims do not recognize methods, models, and …
Social engineering in cybersecurity: Effect mechanisms, human vulnerabilities and attack methods
Social engineering attacks have posed a serious security threat to cyberspace. However,
there is much we have yet to know regarding what and how lead to the success of social …
there is much we have yet to know regarding what and how lead to the success of social …
Internet-based social engineering psychology, attacks, and defenses: A survey
TT Longtchi, RM Rodriguez, L Al-Shawaf… - Proceedings of the …, 2024 - ieeexplore.ieee.org
Internet-based social engineering (SE) attacks are a major cyber threat. These attacks often
serve as the first step in a sophisticated sequence of attacks that target, among other things …
serve as the first step in a sophisticated sequence of attacks that target, among other things …
[HTML][HTML] A holistic review of cyber–physical–social systems: New directions and opportunities
A Cyber–Physical–Social System (CPSS) is an evolving subset of Cyber–Physical Systems
(CPS), which involve the interlinking of the cyber, physical, and social domains within a …
(CPS), which involve the interlinking of the cyber, physical, and social domains within a …
Thwarting instant messaging phishing attacks: the role of self-efficacy and the mediating effect of attitude towards online sharing of personal information
Context: The cause of cybercrime phishing threats in Malaysia is a lack of knowledge and
awareness of phishing. Objective: The effects of self-efficacy (the ability to gain anti-phishing …
awareness of phishing. Objective: The effects of self-efficacy (the ability to gain anti-phishing …
Artificial intelligence and blockchain for cybersecurity applications
F Muheidat, L Tawalbeh - Artificial intelligence and blockchain for future …, 2021 - Springer
Abstract The convergence of Artificial Intelligence and Blockchain is growing very fast in
everyday applications and industry. In centralized systems and applications like healthcare …
everyday applications and industry. In centralized systems and applications like healthcare …
Predicting viral rumors and vulnerable users with graph-based neural multi-task learning for infodemic surveillance
In the age of the infodemic, it is crucial to have tools for effectively monitoring the spread of
rampant rumors that can quickly go viral, as well as identifying vulnerable users who may be …
rampant rumors that can quickly go viral, as well as identifying vulnerable users who may be …
Social engineering attacks: Recent advances and challenges
N Mashtalyar, UN Ntaganzwa, T Santos… - … Conference on Human …, 2021 - Springer
The world's technological landscape is continuously evolving with new possibilities, yet also
evolving in parallel with the emergence of new threats. Social engineering is of predominant …
evolving in parallel with the emergence of new threats. Social engineering is of predominant …
[HTML][HTML] Measuring awareness of social engineering in the educational sector in the kingdom of Saudi Arabia
Social engineering is one of the most inventive methods of gaining unauthorized access to
information systems and obtaining sensitive information. This type of cybersecurity threat …
information systems and obtaining sensitive information. This type of cybersecurity threat …