The file attached to this record is the author's final peer reviewed version.Small and large businesses are increasingly using new technology to store important resources, such as records, financial reports, personal and sensitive data. This paper investigates cybercriminals who use email-based social engineering to influence human behavior and consequently, the authors put forward a framework for mitigating such attacks. Recent findings highlight the heightened levels of cyber-attacks and poor condition of information security systems globally. The complexity of social engineering attacks calls for more attention and methods for mitigation. To this end, using Fuzzy Logic theory, the authors propose a Mamdani Fuzzy Inference Model (FIS) to ...
Social engineering attacks have drawn more and more attention from both academia and industry, due t...
2018 Innovations in Intelligent Systems and Applications Conference, ASYU 2018 --4 October 2018 thro...
Abstract: Today, the use of social network is been increased in daily life of a user. But this incre...
It is a well known fact that the weakest link in a cyber secure system is the people who configure, ...
The article describes a decision support system based on fuzzy inference aimed to automate the proce...
Cyber security risk management plays an important role for today’s businesses due to the rapidly cha...
International audienceDuring this last decade, there have been major improvements in technological a...
The growth of the computerization of processes and services has changed human relations and, as a co...
Social engineering denotes, within the realm of security, a type of attack against the human element...
Social engineering is as old as human beings and has been used for a thousand years in some way such...
In our lives, we cannot avoid the uncertainty. Randomness, rough knowledge, and vagueness lead us to...
The more incessant online business world is accompanied by the increasing number of cases of SPAM e...
Social engineering attacking method is a serious threat that targets the human element of informatio...
Abstract:- Intrusion Detection Systems are increasingly a key part of systems defense. Various appro...
Technology runs much of modern society’s daily functions due to how efficient, reliable, and easy it...
Social engineering attacks have drawn more and more attention from both academia and industry, due t...
2018 Innovations in Intelligent Systems and Applications Conference, ASYU 2018 --4 October 2018 thro...
Abstract: Today, the use of social network is been increased in daily life of a user. But this incre...
It is a well known fact that the weakest link in a cyber secure system is the people who configure, ...
The article describes a decision support system based on fuzzy inference aimed to automate the proce...
Cyber security risk management plays an important role for today’s businesses due to the rapidly cha...
International audienceDuring this last decade, there have been major improvements in technological a...
The growth of the computerization of processes and services has changed human relations and, as a co...
Social engineering denotes, within the realm of security, a type of attack against the human element...
Social engineering is as old as human beings and has been used for a thousand years in some way such...
In our lives, we cannot avoid the uncertainty. Randomness, rough knowledge, and vagueness lead us to...
The more incessant online business world is accompanied by the increasing number of cases of SPAM e...
Social engineering attacking method is a serious threat that targets the human element of informatio...
Abstract:- Intrusion Detection Systems are increasingly a key part of systems defense. Various appro...
Technology runs much of modern society’s daily functions due to how efficient, reliable, and easy it...
Social engineering attacks have drawn more and more attention from both academia and industry, due t...
2018 Innovations in Intelligent Systems and Applications Conference, ASYU 2018 --4 October 2018 thro...
Abstract: Today, the use of social network is been increased in daily life of a user. But this incre...