Birthriya et al., 2024 - Google Patents
A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategiesBirthriya et al., 2024
- Document ID
- 6260182321567698867
- Author
- Birthriya S
- Ahlawat P
- Jain A
- Publication year
- Publication venue
- Journal of Applied Security Research
External Links
Snippet
Social engineering attacks pose a significant threat to individuals, organizations, and governments globally. These attacks leverage human psychology, manipulating individuals into divulging sensitive information or undertaking actions that jeopardize security. The …
- 230000000116 mitigating effect 0 title abstract description 26
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jain et al. | A survey of phishing attack techniques, defence mechanisms and open research challenges | |
Alkhalil et al. | Phishing attacks: A recent comprehensive study and a new anatomy | |
Alabdan | Phishing attacks survey: Types, vectors, and technical approaches | |
Priestman et al. | Phishing in healthcare organisations: Threats, mitigation and approaches | |
Goel et al. | Mobile phishing attacks and defence mechanisms: State of art and open research challenges | |
Diogenes et al. | Cybersecurity-attack and defense strategies: Infrastructure security with red team and blue team tactics | |
Heartfield et al. | A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks | |
Imgraben et al. | Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users | |
Lohani | Social engineering: Hacking into humans | |
Al-Otaibi et al. | A study on social engineering attacks: Phishing attack | |
Kalla et al. | Phishing detection implementation using databricks and artificial Intelligence | |
Shin et al. | Focusing on the weakest link: A similarity analysis on phishing campaigns based on the att&ck matrix | |
Varshney et al. | Anti-phishing: A comprehensive perspective | |
Hassan et al. | Digital Privacy and Security Using Windows: A Practical Guide | |
Kaur et al. | Cybersecurity threats in Fintech | |
Jaber et al. | COVID-19 and global increases in cybersecurity attacks: review of possible adverse artificial intelligence attacks | |
Möller | Threats and threat intelligence | |
Thakral et al. | Cybersecurity and ethics for IoT system: A massive analysis | |
Zamir | Cybersecurity and social media | |
Birthriya et al. | A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies | |
Li et al. | Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites | |
Kajave et al. | How Cyber Criminal Use Social Engineering To Target Organizations | |
Calder | Cyber Security: Essential principles to secure your organisation | |
Muhammad et al. | Information protection of end users on the web: Privacy issues and measures | |
Gururaj et al. | Social Engineering in Cybersecurity: Threats and Defenses |