A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Use of Interpersonal Deception Theory in Counter Social Engineering
2018
International Conference on Information and Knowledge Management
Social engineering attacks exploit human vulnerabilities rather than computer vulnerabilities. Ranging from straightforward spam emails to sophisticated context-aware social engineering, social engineering has demonstrated rich varieties. Surprisingly, even the simplest type of attacks are able to fool numerous innocent people. The more sophisticated ones are even more "successful" in achieving their malicious purposes. In order to mitigate and combat these attacks, we need better automated
dblp:conf/cikm/YangY18
fatcat:foj7z6tvn5dnnghwydumb6cbcq