Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A study on the psychology of social engineering-based cyberattacks and existing countermeasures
As cybersecurity strategies become more robust and challenging, cybercriminals are
mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …
mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …
Review and insight on the behavioral aspects of cybersecurity
Stories of cyber attacks are becoming a routine in which cyber attackers show new levels of
intention by sophisticated attacks on networks. Unfortunately, cybercriminals have figured …
intention by sophisticated attacks on networks. Unfortunately, cybercriminals have figured …
Social engineering in cybersecurity: Effect mechanisms, human vulnerabilities and attack methods
Social engineering attacks have posed a serious security threat to cyberspace. However,
there is much we have yet to know regarding what and how lead to the success of social …
there is much we have yet to know regarding what and how lead to the success of social …
Susceptibility to phishing on social network sites: A personality information processing model
Today, the traditional approach used to conduct phishing attacks through email and spoofed
websites has evolved to include social network sites (SNSs). This is because phishers are …
websites has evolved to include social network sites (SNSs). This is because phishers are …
GramBeddings: a new neural network for URL based identification of phishing web pages through n-gram embeddings
There has been ever-growing use of Internet and progress within many communication
channels such as social media and this escalates the need for rapid and low source …
channels such as social media and this escalates the need for rapid and low source …
Human cognition through the lens of social engineering cyberattacks
Social engineering cyberattacks are a major threat because they often prelude sophisticated
and devastating cyberattacks. Social engineering cyberattacks are a kind of psychological …
and devastating cyberattacks. Social engineering cyberattacks are a kind of psychological …
Internet-based social engineering psychology, attacks, and defenses: A survey
Internet-based social engineering (SE) attacks are a major cyber threat. These attacks often
serve as the first step in a sophisticated sequence of attacks that target, among other things …
serve as the first step in a sophisticated sequence of attacks that target, among other things …
[HTML][HTML] Which factors predict susceptibility to phishing? An empirical study
Phishing is a cybercrime in active growth that victimizes a large number of individuals and
organizations. To explore which individual and contextual factors predict phishing …
organizations. To explore which individual and contextual factors predict phishing …
Email phishing and signal detection: How persuasion principles and personality influence response patterns and accuracy
Phishing is a social engineering tactic where a malicious actor impersonates a trustworthy
third party with the intention of tricking the user into divulging sensitive information. Previous …
third party with the intention of tricking the user into divulging sensitive information. Previous …
Persuasion: How phishing emails can influence users and bypass security measures
Phishing is a very dangerous form of social engineering with the aim to deceive people into
disclosing private/confidential information. Despite widespread warnings and means to …
disclosing private/confidential information. Despite widespread warnings and means to …