44,691 Hits in 13.3 sec

Active Defense Against Social Engineering: The Case for Human Language Technology

Adam Dalton, Ehsan Aghaei, Ehab Al-Shaer, Archna Bhatia, Esteban Castillo, Zhuo Cheng, Sreekar Dhaduvai, Qi Duan, Bryanna Hebenstreit, Md. Mazharul Islam, Younes Karimi, Amir Masoumzadeh (+6 others)
2020 International Conference on Language Resources and Evaluation  
We describe Panacea, a system that supports natural language processing (NLP) components for active defenses against social engineering attacks.  ...  We deploy a pipeline of human language technology, including Ask and Framing Detection, Named Entity Recognition, Dialogue Engineering, and Stylometry.  ...  All statements of fact, opinion or conclusions contained herein are those of the authors and should not be construed as representing the official views or policies of DARPA, AFRL, Army, or the U.S.  ... 
dblp:conf/lrec/DaltonAABCCDDHI20 fatcat:qc7itugvnndm3i4l3nc56ja5xa

Engineered Violence: Confronting the Neutrality Problem and Violence in Engineering

David Adam Banks, Michael Lachney
2017 International Journal of Engineering Social Justice and Peace  
Engineering educators continue to challenge the social/technical dichotomy by framing engineering as a set of non-neutral activities.  ...  We aim to situate nuanced understandings of violence—as understood by 21st century social movements—into the larger goal of reorienting engineering ethics for a more peaceful and socially just world.  ...  The language of peace in these reform proposals prioritizes engineers' social responsibilities to the safety, health, and welfare of humans and the Earth over that of war and corporate profit (Catalano  ... 
doi:10.24908/ijesjp.v5i0.6604 fatcat:k4x4l2g5rvefxlq63wq3qantdy


Tareq Z. Ahram
2013 Management and Production Engineering Review  
Additionally, this paper provides a case study for the application of SE and HSI methodology for engineering sustainable and complex systems.  ...  Engineers implement new technologies and processes to avoid the negative environmental, societal and economic impacts.  ...  However, with the growing interdependence between technology and the economic and social foundations of modern society, there will be an increasing number of opportunities for engineers to exercise their  ... 
doi:10.2478/mper-2013-0032 fatcat:4u4g524jwrg4rpzzcsdw3mehva

Social Engineering Attacks: A Survey

Fatima Salahdine, Naima Kaabouch
2019 Future Internet  
Social engineering is one of the biggest challenges facing network security because it exploits the natural human tendency to trust.  ...  The advancements in digital communication technology have made communication between humans more accessible and instant.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/fi11040089 fatcat:sboj52i2pvcvrev6powu63zlo4

Operational Engines [chapter]

Douglas W. Oard, Carl Madson, Joseph Olive, John McCary, Caitlin Christianson
2011 Handbook of Natural Language Processing and Machine Translation  
The chapter begins with a look at the deployment history over the past decade and a half for speech and language technologies in operational environments.  ...  The goal of the GALE Program is to empower the warfighter through the use of language technologies.  ...  We would also like to thank Charles Wayne for his early contributions to the pre-GALE efforts.  ... 
doi:10.1007/978-1-4419-7713-7_6 fatcat:lmrbdpy5sjbkxokmxv4a7vbf74

Social Engineering Attacks Prevention: A Systematic Literature Review

Wenni Syafitri, Zarina Shukur, Umi A. Mokhtar, Rossilawati Sulaiman, Muhammad Azwan Ibrahim
2022 IEEE Access  
Social engineering is an attack on information security for accessing systems or networks.  ...  The human as a security sensor framework needs guidance that will explore cybersecurity as super-recognizers, likely policing act for a secure system.  ...  Heartfield and Loukas [8] developed a defense framework against social engineering attacks focusing on humans as sensors to detect and report the existence of social engineering attacks (Human-as-a-Security-Sensor  ... 
doi:10.1109/access.2022.3162594 fatcat:y2t4jlbfprfyzfjdfro5r2wyt4

Cloning, genetic engineering, and the limits of procreative liberty

M A Ryan
1998 Valparaiso University law review. Valparaiso University. School of Law  
genetic engineering today is not, as Huxley supposed, "How do we protect human reproduction (and human nature) against government control?"  ...  Post, The Judeo-Christian Case Against Human Cloning, AMERICA, June 21, 1997, at 19, 22; Ryan, supra note 26, at 8.  ... 
pmid:12710456 fatcat:7hxmdgnwn5bftn3wxdrfxhd344

A Survey of Social Engineers that did not Collect Enough Data

Adrian Dana Austin, Department of Technology Systems, East Carolina University, Greenville, North Carolina, USA
2022 Engineering and Technology Journal  
In The context of Information technology and Cyber Security a nexus of computers and humans occurs as Social engineering.  ...  The purpose of this research initially was to find out from Social Engineers what were the best defensive techniques.  ...  Education and correction of activities undertaken by humans that negatively affects the security of information technology systems is the area of study for social engineering defense.  ... 
doi:10.47191/etj/v7i6.03 fatcat:o2bxfy4gevgrhgqv6fqwtlfizy

Information engineering [chapter]

2015 Engineering Technology, Engineering Education and Engineering Management  
In general, social rather than technological factors determine the state of information flow effectiveness.  ...  The body is prepared for quick decisions, vigorous action, "superhuman" effort, and defense against injury. Hearing and smelling become more acute. Faster breathing brings in more oxygen.  ... 
doi:10.1201/b18566-169 fatcat:f4tnw42ycbegvofa7lngfplooa

Engineering a Principle

Tarleton Gillespie
2006 Social Studies of Science  
Its ubiquity and opacity cloaks the complexity of the technology it describes, and stands in for a richer controversy about the details of network design.  ...  As such, it actively managed and aligned disparate structural agendas, and has had subtle consequences for how the Internet has been understood, sold, legislated, and even redesigned.  ...  , human evaluation, and human benefits that must be traded off against each other ...  ... 
doi:10.1177/0306312706056047 fatcat:nyns7cujwvcujf62ursc26zfke

Faculty of Special Engineering

Pavel Polednak
2003 Communications - Scientific Letters of the University of Zilina  
The studies are technologically oriented toward fire prevention and repressive activities, emergency tasks and work of fire brigades.  ...  technology, informatics, automation, designing of engineering tasks, health safety and security of work.  ...  Risk is a part of social entity and so risk has to be identified in social environment as well as in existence and behaviour of every human being.  ... 
doi:10.26552/com.c.2003.3.81-90 fatcat:6sdngx4i5nafpej4zn5hykeugi

A Semantic Search Engine For Investigating Human Trafficking

Mayank Kejriwal, Thomas Schellenberg, Pedro A. Szekely
2017 International Semantic Web Conference  
In this demo, we present an investigative search engine that meets some of these challenges, at scale, for a variety of complex queries in the human trafficking domain.  ...  by hundreds of US law enforcement agencies for investigating human trafficking.  ...  This research is supported by the Defense Advanced Research Projects Agency (DARPA) and the Air Force Research Laboratory (AFRL) under contract number FA8750-14-C-0240.  ... 
dblp:conf/semweb/KejriwalSS17 fatcat:bpuieiqjn5c3bjnefezdrplcgu

The Regulation of Climate Engineering

Jesse Reynolds
2011 Law, Innovation and Technology  
In general, the case for such protection is weak.  ...  Protocol-currently the primary platform of national commitmentslimits credit for emission reduction via sinks to 'human-induced land-use change and forestry activities'. 38 Climate engineering proposals  ...  Because this is the approach of the SRM Governance Initiative, it holds potential for significant progress toward regulation of SRM research.  ... 
doi:10.5235/175799611796399821 fatcat:p2hhrt2kmzbrznxnlyzm3ydvri

Advanced social engineering attacks

Katharina Krombholz, Heidelinde Hobel, Markus Huber, Edgar Weippl
2015 Journal of Information Security and Applications  
The services used by today's knowledge workers prepare the ground for sophisticated social engineering attacks.  ...  The decrease in personal interaction combined with a plethora of tools used for communication (e-mail, IM, Skype, Dropbox, LinkedIn, Lync, etc.) create new attack vectors for social engineering attacks  ...  The Red October APT remained active for almost six years.  ... 
doi:10.1016/j.jisa.2014.09.005 fatcat:vqnwp6blfvcytebxglm4pvwl2y

The Origin of Chinese Modern Engineering Education: Fuzhou Shipping School's Engineering Education at Late Qing Dynasty

Chen Jia
2014 Philosophy Study  
This article takes Fuzhou Shipping School for case studies, using a cultural anthropology approach to examine the overall status, basic characteristics, and impact evaluation of engineering education during  ...  Thanks to their efforts, many schools and old-style private schools for teaching knowledge about western science and technology and training senior engineering managements and talents were gradually founded  ...  During this period, the main goal of the coast defense engineering is to defense invasion from the sea, which means defense against the foreign invaders' invasion from the sea.  ... 
doi:10.17265/2159-5313/2014.04.006 fatcat:qxzwv5xbbra2viq5zc4h7bghom
« Previous Showing results 1 — 15 out of 44,691 results