Search

Your search keyword '"*SOCIAL engineering (Fraud)"' showing total 1,331 results

Search Constraints

Start Over You searched for: Descriptor "*SOCIAL engineering (Fraud)" Remove constraint Descriptor: "*SOCIAL engineering (Fraud)"
1,331 results on '"*SOCIAL engineering (Fraud)"'

Search Results

1. Decoding the 15-Minute City Debate: Conspiracies, Backlash, and Dissent in Planning for Proximity.

2. A Neuroscience Perspective on AI and Cybersecurity.

3. Cybersecurity Leadership Challenges in an Evolving Threat Landscape.

4. The political economy of Berlusconi's tax-benefit policy: rhetoric or reality?

5. From Embodied Abuse to Mass Disruption: Generative, Inter-Reality Threats in Social, Mixed-Reality Platforms.

6. Social automation and APT attributions in national cybersecurity.

7. Artificial Intelligence in Cybersecurity: A Review and a Case Study.

8. On emergent mobile phone-based social engineering cyberattacks in developing countries: The case of the Zambian ICT sector.

9. Blockchain-based Authentication Scheme in Oil and Gas Industry Data with Thermal CCTV Cameras Applications to Mitigate Sybil and 51% Cyber Attacks.

10. Bit Sufi-Dance: Covert Data Exfiltration from Air-Gapped Networks via Electricity Meter.

11. Masters of War.

12. Analysis of generation Z characters in using social media applications on the internet.

13. REDUCE Your Risk: BEST PRACTICES TO STRENGTHEN YOUR CYBERSECURITY DEFENSES.

14. Tom Clancy's Splinter Cell: Blacklist.

15. Beyond Technical Barriers: A Multidimensional Conceptual Framework for Understanding and Countering Cyber Scam Susceptibility.

16. Toward the Adoption of Explainable Pre-Trained Large Language Models for Classifying Human-Written and AI-Generated Sentences.

17. The Latent or Covert Signs and Symptoms of Cyber Victimization and Risky Online Behaviors: An Integrative Review.

18. The Resettlement from Poland to the Soviet Union, 1944-47: Nation, Class, and Propaganda in Soviet Governance.

19. Uso responsable de Internet y seguridad digital: revisión sistemática de programas educativos.

20. Security, Privacy, and Surveillance in Cyberspace: Organizational Science Concerns and Contributions.

21. A SOCIAL ENGINEERING FEJLŐDÉSE ÉS JÖVŐJE: A PSZICHOLÓGIAI SEBEZHETŐSÉGEK KIHASZNÁLÁSA A DIGITÁLIS KORBAN.

22. Procedural fairness in ethnic-cultural decision-making: Benefits, processes and minority and majority group perspectives.

23. Racialized Railway Mobilities: Repression and Resistance in the Anglophone South African Short Story During the Drum Decade.

24. An improved transformer‐based model for detecting phishing, spam and ham emails: A large language model approach.

25. التشكيلات الحديثةللمقاومة في الضفةالغربية: بين الكتيبة والعرين.

26. DeepEPhishNet: a deep learning framework for email phishing detection using word embedding algorithms.

27. DANGEROUSNESS OF CLIENT-SIDE CODE EXECUTION WITH MICROSOFT OFFICE.

28. The power of data: Transforming compliance with anti-money laundering measures in domestic and cross-border payments.

29. A holistic qualitative exploration on the perception of scams, scam techniques and effectiveness of anti-scam campaigns in Malaysia.

30. Social Engineering Awareness in ODLS: A Survey on Human Vulnerabilities in Cybersecurity.

31. Use Of Digital Forensic Technology To Reveal The Identity Of Social Engineering Crimes.

32. Developing and implementing social engineering-prevention policies: a qualitative study.

33. Cybersecurity Trends in the European Union: Regulatory Mercantilism and the Digitalisation of Geopolitics.

34. XAI-PhD: Fortifying Trust of Phishing URL Detection Empowered by Shapley Additive Explanations.

35. Evidence-based social science: why, what, and future implications.

36. Jijiji, Jajaja, Sabotaje y Campaña Sucia: WhatsApp en las Elecciones Presidenciales Chilenas de 2021.

37. A novel deep learning model-based optimization algorithm for text message spam detection.

38. Toward a Hybrid Approach Combining Deep Learning and Case-Based Reasoning for Phishing Email Detection.

39. Telling a Scientific Story and Governing the Population: the Kallikak Story and the Historical Mutations of the Eugenic Discourse.

42. A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords.

44. Cybersecurity: Safeguarding the digital landscape.

45. The challenges of cyber space with crime-as-a-service (CAAS) to amateur attackers.

46. Phishing Attacks Are Evolving. Here's How to Resist Them.

47. SPOOFIING UNMASKED: Cheating criminals shatter trust.

49. 10 tips to help avoid wire fraud scams.

50. Handling Your Digital Assets.

Catalog

Books, media, physical & digital resources