Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Defining social engineering in cybersecurity
Social engineering has posed a serious security threat to infrastructure, user, data and
operations of cyberspace. Nevertheless, there are many conceptual deficiencies (such as …
operations of cyberspace. Nevertheless, there are many conceptual deficiencies (such as …
Review OSINT tool for social engineering
M Nobili - Frontiers in big data, 2023 - frontiersin.org
In recent years, we observed an increase in cyber threats, especially social engineering
attacks. By social engineering, we mean a set of techniques and tools to collect information …
attacks. By social engineering, we mean a set of techniques and tools to collect information …
Social engineering attacks and defenses in the physical world vs. cyberspace: a contrast study
Social engineering attacks are phenomena that are equally applicable to both the physical
world and cyberspace. These attacks in the physical world have been studied for a much …
world and cyberspace. These attacks in the physical world have been studied for a much …
Social automation and APT attributions in national cybersecurity
S Yadav - Journal of Cyber Security Technology, 2024 - Taylor & Francis
ABSTRACT Advanced Persistent Threats (APTs) are a prime concern in the formulation and
implementation of national cybersecurity policies. These threats often also involve complex …
implementation of national cybersecurity policies. These threats often also involve complex …
Social engineering and technical security fusion
Ensuring the secure transmission of sensitive messages over unsecured networks has been
a staggering problem in the face of scientists and engineers in recent times. This is …
a staggering problem in the face of scientists and engineers in recent times. This is …
A simulated cyberattack on Twitter: Assessing partisan vulnerability to spear phishing and disinformation ahead of the 2018 US midterm elections
M Bossetta - arxiv preprint arxiv:1811.05900, 2018 - arxiv.org
State-sponsored" bad actors" increasingly weaponize social media platforms to launch
cyberattacks and disinformation campaigns during elections. Social media companies, due …
cyberattacks and disinformation campaigns during elections. Social media companies, due …
Capturing push-processing using enriched semantic mesh equipped with functionals-and-hops model
L Ismailova, V Wolfengagen, S Kosikov… - Procedia Computer …, 2020 - Elsevier
One of the aims of this paper is to study how to define meshes, a kind of wireframe semantic
models hidden behind the variety of external forms of manifestation of information processes …
models hidden behind the variety of external forms of manifestation of information processes …