Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Social engineering in cybersecurity: a domain ontology and knowledge graph application examples
Social engineering has posed a serious threat to cyberspace security. To protect against
social engineering attacks, a fundamental work is to know what constitutes social …
social engineering attacks, a fundamental work is to know what constitutes social …
Toward a phishing attack ontology
Phishing attacks are the most common form of social engineering where attackers intend to
deceive targeted people into revealing sensitive information or installing malware. To …
deceive targeted people into revealing sensitive information or installing malware. To …
[PDF][PDF] Enhancing information security awareness among Omani public sector employees: A pilot study
I Al-Shanfari, W Yassin, RS Abdullah… - International Journal on …, 2020 - researchgate.net
Awareness plays an important role in the field of information security (IS) due to its positive
impact on staff adherence to security policies. With the development and increase in cases …
impact on staff adherence to security policies. With the development and increase in cases …
[PDF][PDF] An Ontological Approach to Security Modeling
Í Oliveira - 2024 - researchgate.net
This thesis contributes to the definition of general ontological foundations for security
modeling, that is, conceptual modeling activities within the security domain. In this chapter …
modeling, that is, conceptual modeling activities within the security domain. In this chapter …