[HTML][HTML] A study on the psychology of social engineering-based cyberattacks and existing countermeasures

MA Siddiqi, W Pak, MA Siddiqi - Applied Sciences, 2022 - mdpi.com
As cybersecurity strategies become more robust and challenging, cybercriminals are
mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …

Social engineering attacks prevention: A systematic literature review

W Syafitri, Z Shukur, U Asma'Mokhtar… - IEEE …, 2022 - ieeexplore.ieee.org
Social engineering is an attack on information security for accessing systems or networks.
Social engineering attacks occur when victims do not recognize methods, models, and …

Social engineering in cybersecurity: Effect mechanisms, human vulnerabilities and attack methods

Z Wang, H Zhu, L Sun - Ieee Access, 2021 - ieeexplore.ieee.org
Social engineering attacks have posed a serious security threat to cyberspace. However,
there is much we have yet to know regarding what and how lead to the success of social …

Internet-based social engineering psychology, attacks, and defenses: A survey

TT Longtchi, RM Rodriguez, L Al-Shawaf… - Proceedings of the …, 2024 - ieeexplore.ieee.org
Internet-based social engineering (SE) attacks are a major cyber threat. These attacks often
serve as the first step in a sophisticated sequence of attacks that target, among other things …

[HTML][HTML] A holistic review of cyber–physical–social systems: New directions and opportunities

T Sobb, B Turnbull, N Moustafa - Sensors, 2023 - mdpi.com
A Cyber–Physical–Social System (CPSS) is an evolving subset of Cyber–Physical Systems
(CPS), which involve the interlinking of the cyber, physical, and social domains within a …

Thwarting instant messaging phishing attacks: the role of self-efficacy and the mediating effect of attitude towards online sharing of personal information

YY Lee, CL Gan, TW Liew - … of Environmental Research and Public Health, 2023 - mdpi.com
Context: The cause of cybercrime phishing threats in Malaysia is a lack of knowledge and
awareness of phishing. Objective: The effects of self-efficacy (the ability to gain anti-phishing …

Artificial intelligence and blockchain for cybersecurity applications

F Muheidat, L Tawalbeh - Artificial intelligence and blockchain for future …, 2021 - Springer
Abstract The convergence of Artificial Intelligence and Blockchain is growing very fast in
everyday applications and industry. In centralized systems and applications like healthcare …

Predicting viral rumors and vulnerable users with graph-based neural multi-task learning for infodemic surveillance

X Zhang, W Gao - Information Processing & Management, 2024 - Elsevier
In the age of the infodemic, it is crucial to have tools for effectively monitoring the spread of
rampant rumors that can quickly go viral, as well as identifying vulnerable users who may be …

Social engineering attacks: Recent advances and challenges

N Mashtalyar, UN Ntaganzwa, T Santos… - … Conference on Human …, 2021 - Springer
The world's technological landscape is continuously evolving with new possibilities, yet also
evolving in parallel with the emergence of new threats. Social engineering is of predominant …

[HTML][HTML] Measuring awareness of social engineering in the educational sector in the kingdom of Saudi Arabia

MH Alsulami, FD Alharbi, HM Almutairi, BS Almutairi… - Information, 2021 - mdpi.com
Social engineering is one of the most inventive methods of gaining unauthorized access to
information systems and obtaining sensitive information. This type of cybersecurity threat …