Cited By
View all- Tofighi MOusat BZandi JSchafir EKharraz A(2024)Constructs of Deceit: Exploring Nuances in Modern Social Engineering AttacksDetection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-031-64171-8_6(107-127)Online publication date: 17-Jul-2024
- Chitare NCoventry LNicholson J(2023)“It may take ages”: Understanding Human-Centred Lateral Phishing Attack Detection in OrganisationsProceedings of the 2023 European Symposium on Usable Security10.1145/3617072.3617116(344-355)Online publication date: 16-Oct-2023
- Kontogeorgopoulos KKritikos K(2023)Overview of Social Engineering Protection and Prevention MethodsComputer Security. ESORICS 2023 International Workshops10.1007/978-3-031-54204-6_4(64-83)Online publication date: 25-Sep-2023
- Show More Cited By