Kim et al., 2018 - Google Patents
Social engineering based security requirements elicitation model for advanced persistent threatsKim et al., 2018
- Document ID
- 9006805159377109302
- Author
- Kim S
- Lee S
- Publication year
- Publication venue
- Requirements Engineering for Internet of Things: 4th Asia-Pacific Symposium, APRES 2017, Melaka, Malaysia, November 9–10, 2017, Proceedings 4
External Links
Snippet
APT attacks are increasing every year, and these APT attacks begin with social engineering attacks. In order to be effective in blocking APT attacks, blocking social engineering attacks make it possible to prevent APT attacks in advance. In this study, we define human factors …
- 230000002085 persistent 0 title description 12
Classifications
-
- F—MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING ENGINES OR PUMPS
- F41—WEAPONS
- F41H—ARMOUR; ARMOURED TURRETS; ARMOURED OR ARMED VEHICLES; MEANS OF ATTACK OR DEFENCE, e.g. CAMOUFLAGE, IN GENERAL
- F41H5/00—Armour; Armour plates
- F41H5/02—Plate construction
- F41H5/04—Plate construction composed of more than one layer
- F41H5/0442—Layered armour containing metal
- F41H5/045—Layered armour containing metal all the layers being metal layers
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Agrafiotis et al. | A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate | |
Sarkar | Assessing insider threats to information security using technical, behavioural and organisational measures | |
Tounsi | What is cyber threat intelligence and how is it evolving? | |
Gehem et al. | Assessing cyber security: A meta analysis of threats, trends, and responses to cyber attacks | |
Duarte et al. | Social engineering: the art of attacks | |
Calder | A business guide to information security: how to protect your company's IT assets, reduce risks and understand the law | |
Wallang et al. | Cyber security in Small and Medium Enterprises (SMEs): What’s good or bad? | |
Eybers et al. | Investigating cyber security awareness (CSA) amongst managers in small and medium enterprises (SMEs) | |
Benson et al. | Cyber influence and cognitive threats | |
Johnson | Managing information risk and the economics of security | |
Tuli et al. | An overview on cyber crime and cyber security | |
Kim et al. | Social engineering based security requirements elicitation model for advanced persistent threats | |
Choraś et al. | Are we doing all the right things to counter cybercrime? | |
Ezeji et al. | Cyber-related crime in South Africa: extent and perspectives of state’s roleplayers | |
Nyawanga | Meeting the challenge of cyber threats in emerging electronic transaction technologies in in Kenyan banking sector | |
Yusup | Cyber Security Sharing Platform: Indonesia Approach in Law Enforcement of Financial Transaction Crimes | |
Kızıl et al. | Audit Techniques for Protecting against Cyber Attacks: A Bilateral Approach of Case Studies and Interview | |
Gourisaria et al. | Cybersecurity Imminent Threats with Solutions in Higher Education | |
King | Bring your own device security awareness and security behavior: a quantitative explanatory study | |
Seaman | Combating the Cyber-Security Kill Chain: Moving to a Proactive Security Model | |
Kambourakis et al. | Information security in the age of EU-Institutions digitalisation, a landscape analysis | |
Pogrebna et al. | Existing solutions summary | |
Gelbstein | Protecting critical information infrastructures | |
Tomić Rotim et al. | Cybersecurity Talent Shortage | |
Lavanya et al. | CYBER SECURITY AWARENESS AMONG B SCHOOL STUDENTS IN HIGHER EDUCATION INSTITUTION-WAY FORWARD |