[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kim et al., 2018 - Google Patents

Social engineering based security requirements elicitation model for advanced persistent threats

Kim et al., 2018

Document ID
9006805159377109302
Author
Kim S
Lee S
Publication year
Publication venue
Requirements Engineering for Internet of Things: 4th Asia-Pacific Symposium, APRES 2017, Melaka, Malaysia, November 9–10, 2017, Proceedings 4

External Links

Snippet

APT attacks are increasing every year, and these APT attacks begin with social engineering attacks. In order to be effective in blocking APT attacks, blocking social engineering attacks make it possible to prevent APT attacks in advance. In this study, we define human factors …
Continue reading at link.springer.com (other versions)

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING ENGINES OR PUMPS
    • F41WEAPONS
    • F41HARMOUR; ARMOURED TURRETS; ARMOURED OR ARMED VEHICLES; MEANS OF ATTACK OR DEFENCE, e.g. CAMOUFLAGE, IN GENERAL
    • F41H5/00Armour; Armour plates
    • F41H5/02Plate construction
    • F41H5/04Plate construction composed of more than one layer
    • F41H5/0442Layered armour containing metal
    • F41H5/045Layered armour containing metal all the layers being metal layers

Similar Documents

Publication Publication Date Title
Agrafiotis et al. A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
Sarkar Assessing insider threats to information security using technical, behavioural and organisational measures
Tounsi What is cyber threat intelligence and how is it evolving?
Gehem et al. Assessing cyber security: A meta analysis of threats, trends, and responses to cyber attacks
Duarte et al. Social engineering: the art of attacks
Calder A business guide to information security: how to protect your company's IT assets, reduce risks and understand the law
Wallang et al. Cyber security in Small and Medium Enterprises (SMEs): What’s good or bad?
Eybers et al. Investigating cyber security awareness (CSA) amongst managers in small and medium enterprises (SMEs)
Benson et al. Cyber influence and cognitive threats
Johnson Managing information risk and the economics of security
Tuli et al. An overview on cyber crime and cyber security
Kim et al. Social engineering based security requirements elicitation model for advanced persistent threats
Choraś et al. Are we doing all the right things to counter cybercrime?
Ezeji et al. Cyber-related crime in South Africa: extent and perspectives of state’s roleplayers
Nyawanga Meeting the challenge of cyber threats in emerging electronic transaction technologies in in Kenyan banking sector
Yusup Cyber Security Sharing Platform: Indonesia Approach in Law Enforcement of Financial Transaction Crimes
Kızıl et al. Audit Techniques for Protecting against Cyber Attacks: A Bilateral Approach of Case Studies and Interview
Gourisaria et al. Cybersecurity Imminent Threats with Solutions in Higher Education
King Bring your own device security awareness and security behavior: a quantitative explanatory study
Seaman Combating the Cyber-Security Kill Chain: Moving to a Proactive Security Model
Kambourakis et al. Information security in the age of EU-Institutions digitalisation, a landscape analysis
Pogrebna et al. Existing solutions summary
Gelbstein Protecting critical information infrastructures
Tomić Rotim et al. Cybersecurity Talent Shortage
Lavanya et al. CYBER SECURITY AWARENESS AMONG B SCHOOL STUDENTS IN HIGHER EDUCATION INSTITUTION-WAY FORWARD