Social engineering attacks prevention: A systematic literature review
W Syafitri, Z Shukur, U Asma'Mokhtar… - IEEE …, 2022 - ieeexplore.ieee.org
Social engineering is an attack on information security for accessing systems or networks.
Social engineering attacks occur when victims do not recognize methods, models, and …
Social engineering attacks occur when victims do not recognize methods, models, and …
Detecting social bots on twitter: a literature review
Due to the exponential growth in the popularity of online social networks (OSNs), such as
Twitter and Facebook, the number of machine accounts that are designed to mimic human …
Twitter and Facebook, the number of machine accounts that are designed to mimic human …
Hierarchical fixed priority pre-emptive scheduling
This paper focuses on the hierarchical scheduling of systems where a number of separate
applications reside on a single processor. It addresses the particular case where fixed …
applications reside on a single processor. It addresses the particular case where fixed …
CHAT-Bot: A cultural heritage aware teller-bot for supporting touristic experiences
Cultural heritage is an important resource that allows us to know and promote a territory. In
this respect, it is important to experiment with the enhancement of cultural heritage by …
this respect, it is important to experiment with the enhancement of cultural heritage by …
A survey of big data dimensions vs social networks analysis
The pervasive diffusion of Social Networks (SN) produced an unprecedented amount of
heterogeneous data. Thus, traditional approaches quickly became unpractical for real life …
heterogeneous data. Thus, traditional approaches quickly became unpractical for real life …
Bot2Vec: A general approach of intra-community oriented representation learning for bot detection in different types of social networks
Recently, due to the rapid growth of online social networks (OSNs) such as Facebook,
Twitter, Weibo, etc. the number of machine accounts/social bots that mimic human users has …
Twitter, Weibo, etc. the number of machine accounts/social bots that mimic human users has …
Digital forensics supported by machine learning for the detection of online sexual predatory chats
Chat-logs are informative digital footprints available on Social Media Platforms (SMPs). With
the rise of cybercrimes targeting children, chat-logs can be used to discover and flag harmful …
the rise of cybercrimes targeting children, chat-logs can be used to discover and flag harmful …
[PDF][PDF] Desafíos nacionales frente a la ciberseguridad en el escenario global: un análisis para Colombia
En este artículo se aborda el tema de la seguridad de la información frente a amenazas
cibernéticas en un contexto global, haciendo una revisión de la situación actual en …
cibernéticas en un contexto global, haciendo una revisión de la situación actual en …
Analyse digital forensic evidences through a semantic-based methodology and NLP techniques
The increasing adoption of digital technologies to manage and process information used in
everyday life, results in an increase in the demand for digital data analysis for investigative …
everyday life, results in an increase in the demand for digital data analysis for investigative …
The impact of technology readiness on the big data adoption among UAE organisations
Big Data is an important player in offering a highly competitive advantage, specialty, in
contemporary organisations. The theory of technology readiness can be used for measuring …
contemporary organisations. The theory of technology readiness can be used for measuring …