Abstract Social engineering has posed a serious threat to cyberspace security. To protect against social engineering attacks, a fundamental work is to know what constitutes social engineering. This paper first develops a domain ontology of social engineering in cybersecurity and conducts ontology evaluation by its knowledge graph application. The domain ontology defines 11 concepts of core entities that significantly constitute or affect social engineering domain, together with 22 kinds of relations describing how these entities related to each other. It provides a formal and explicit knowledge schema to understand, analyze, reuse and share domain knowledge of social engineering. Furthermore, this paper builds a knowledge graph based on 15 ...
Abstract — Intrusion Detection Systems are tools used to detect attacks against networks. Many of th...
Social engineering attacks can be severe and difficult to detect before considerable damage is done....
Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that e...
Part 3: Peace, War, Cyber-Security and ICTInternational audienceThe human is often the weak link in ...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and thre...
This paper highlights methods of syntactic and semantic social engineering attacks (human-based and ...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that e...
International audienceDuring this last decade, there have been major improvements in technological a...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
The structure and basic principles of technology for increasing the probability of identifying subj...
Considering the continuous growth in the complexity of both information systems and security informa...
Abstract: Growth of technologies, interconnected systems and digitalization, securing data becomes a...
Social engineering denotes, within the realm of security, a type of attack against the human element...
Abstract — Intrusion Detection Systems are tools used to detect attacks against networks. Many of th...
Social engineering attacks can be severe and difficult to detect before considerable damage is done....
Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that e...
Part 3: Peace, War, Cyber-Security and ICTInternational audienceThe human is often the weak link in ...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and thre...
This paper highlights methods of syntactic and semantic social engineering attacks (human-based and ...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that e...
International audienceDuring this last decade, there have been major improvements in technological a...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
The structure and basic principles of technology for increasing the probability of identifying subj...
Considering the continuous growth in the complexity of both information systems and security informa...
Abstract: Growth of technologies, interconnected systems and digitalization, securing data becomes a...
Social engineering denotes, within the realm of security, a type of attack against the human element...
Abstract — Intrusion Detection Systems are tools used to detect attacks against networks. Many of th...
Social engineering attacks can be severe and difficult to detect before considerable damage is done....
Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that e...