Social engineering attacks: A survey

F Salahdine, N Kaabouch - Future internet, 2019 - mdpi.com
The advancements in digital communication technology have made communication
between humans more accessible and instant. However, personal and sensitive information …

SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

The science of detecting LLM-generated text

R Tang, YN Chuang, X Hu - Communications of the ACM, 2024 - dl.acm.org
ACM: Digital Library: Communications of the ACM ACM Digital Library Communications of the
ACM Volume 67, Number 4 (2024), Pages 50-59 The Science of Detecting LLM-Generated Text …

Membership inference attacks from first principles

N Carlini, S Chien, M Nasr, S Song… - … IEEE symposium on …, 2022 - ieeexplore.ieee.org
A membership inference attack allows an adversary to query a trained machine learning
model to predict whether or not a particular example was contained in the model's training …

Tiresias: Predicting security events through deep learning

Y Shen, E Mariconti, PA Vervier… - Proceedings of the 2018 …, 2018 - dl.acm.org
With the increased complexity of modern computer attacks, there is a need for defenders not
only to detect malicious activity as it happens, but also to predict the specific steps that will …

Deepcase: Semi-supervised contextual analysis of security events

T Van Ede, H Aghakhani, N Spahn… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Security monitoring systems detect potentially malicious activities in IT infrastructures, by
either looking for known signatures or for anomalous behaviors. Security operators …

Skill squatting attacks on Amazon Alexa

D Kumar, R Paccagnella, P Murley… - 27th USENIX security …, 2018 - usenix.org
The proliferation of the Internet of Things has increased reliance on voice-controlled devices
to perform everyday tasks. Although these devices rely on accurate speech recognition for …

Sok: Pragmatic assessment of machine learning for network intrusion detection

G Apruzzese, P Laskov… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Machine Learning (ML) has become a valuable asset to solve many real-world tasks. For
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …

Internet-based social engineering psychology, attacks, and defenses: A survey

TT Longtchi, RM Rodriguez, L Al-Shawaf… - Proceedings of the …, 2024 - ieeexplore.ieee.org
Internet-based social engineering (SE) attacks are a major cyber threat. These attacks often
serve as the first step in a sophisticated sequence of attacks that target, among other things …

Chainsmith: Automatically learning the semantics of malicious campaigns by mining threat intelligence reports

Z Zhu, T Dumitras - … IEEE European symposium on security and …, 2018 - ieeexplore.ieee.org
Modern cyber attacks consist of a series of steps and are generally part of larger campaigns.
Large-scale field data provides a quantitative measurement of these campaigns. On the …