Information security technology? ...don't rely on it: A case study in social engineering, Proceedings of the 5th Conference on USENIX UNIX Security Symposium -Volume 5. SSYM'95, pp.1-1, 1995. ,
The art of deception: controlling the human element of security, 2002. ,
Ontologies and semantics for seamless connectivity, ACM SIGMOD Record, vol.33, issue.4, pp.58-64, 2004. ,
DOI : 10.1145/1041410.1041420
The hack attack - Increasing computer system awareness of vulnerability threats, 3rd Applying Technology to Systems; Aerospace Computer Security Conference, pp.155-157, 1987. ,
DOI : 10.2514/6.1987-3093
Foiling the wiley hacker: more than analysis and containment, Proceedings. International Carnahan Conference on Security Technology, pp.15-21, 1989. ,
DOI : 10.1109/CCST.1989.751947
In search of the cuckoo's nest (computer security), Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology, pp.181-191, 1991. ,
DOI : 10.1109/CCST.1991.202213
The Best of 2600, Collector's Edition: A Hacker Odyssey, 2009. ,
Social engineering, Proceedings of the 1st annual conference on Information security curriculum development , InfoSecCD '04, pp.133-135, 2004. ,
DOI : 10.1145/1059524.1059554
Securing Information Assets: Understanding, Measuring and Protecting against Social Engineering Attacks, 2008. ,
An overview of social engineering malware: Trends, tactics, and implications, Technology in Society, vol.32, issue.3, pp.183-196, 2010. ,
DOI : 10.1016/j.techsoc.2010.07.001
Trojans, worms, and spyware: a computer security professional's guide to malicious code, 2004. ,
The socialbot network, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, pp.93-102, 2011. ,
DOI : 10.1145/2076732.2076746
Design and analysis of a social botnet, 2013) 556 ? 578 <ce:title>Botnet Activity: Analysis, Detection and Shutdown</ce:title> ,
DOI : 10.1016/j.comnet.2012.06.006
The use of formal social engineering techniques to identify weaknesses during a computer vulnerability competition, Journal of Computing Sciences in Colleges, vol.26, issue.2, pp.80-87, 2010. ,
Cyber security tip st04-0141, avoiding social engineering and phishing attacks, 2013. ,
Social engineering and awareness training, 2010. ,
Effectiveness of using red teams to identify maritime security vulnerabilities to terrorist attack. Master's thesis, Naval Postgraduate School, 2004. ,
Analysis of a social engineering threat to information security exacerbated by vulnerabilities exposed through the inherent nature of social networking websites, 2009 Information Security Curriculum Development Conference on, InfoSecCD '09, pp.139-141, 2009. ,
DOI : 10.1145/1940976.1941003
CompTIA A+ Complete Study Guide, 2007. ,
Evaluating information assurance strategies, Decision Support Systems, vol.39, issue.3, pp.463-484, 2005. ,
DOI : 10.1016/j.dss.2003.11.004
Modeling information assurance: A value focused thinking approach. Master's thesis, Air Force Institute of Technology, 2000. ,
Behavioural modelling of social engineering-based malicious software, Virus Bulletin Conf, 2006. ,
Security issues in health care process integration? a research-in-progress report, 2005. ,
Social engineering fundamentals, part i: Hacker tactics, 2001. ,
Social recruiting: a next generation social engineering attack, Uses in Warfare and the Safeguarding of Peace, 2012. ,
Social Engineering: The Art of Human Hacking, 2010. ,
Using online activity as digital fingerprints to create a better spear phisher, 2013. ,
Pervasive Information Security and Privacy Developments: Trends and Advancements. First edition edn, Information Science Reference, 2010. ,
DOI : 10.4018/978-1-61692-000-5
Understanding and managing cybercrime, 2006. ,
Mitigating the risk of social engineering attacks, 2011. ,
The vulnerability of social networking media and the insider threat new eyes for bad guys, Naval Postgraduate School, 2011. ,
Social engineering attack detection model: SEADM, 2010 Information Security for South Africa, pp.1-8, 2010. ,
DOI : 10.1109/ISSA.2010.5588500
Development of cognitive functioning psychological measures for the seadm, In: Human Aspects of Information Security & Assurance, 2012. ,
Social engineering from a normative ethics perspective, 2013 Information Security for South Africa, pp.1-8, 2013. ,
DOI : 10.1109/ISSA.2013.6641064
Detecting and combating malware, 2011. ,
Re-floating the titanic: Dealing with social engineering attacks, European Institute for Computer Antivirus Research, 1998. ,
Development of methodical social engineering taxonomy project. Msc, Naval Postgraduate School, 2006. ,
A taxonomy for social engineering attacks, International Conference on Information Resources Management, Centre for Information Technology, Organizations, and People, 2011. ,
Generic taxonomy of social engineering attack, Malaysian Technical Universities International Conference on Engineering & Technology, 2011. ,
Dissecting social engineering, Behaviour & Information Technology, vol.13, issue.9, pp.1014-1023, 2013. ,
DOI : 10.1002/asi.20779
Clarity in the usage of the terms ontology, taxonomy and classification, CIB REPORT, vol.284, issue.432, pp.1-8, 2003. ,
A translation approach to portable ontology specifications. Knowledge Acquisition -Special issue: Current issues in knowledge modeling, pp.199-220, 1993. ,
Ontology development 101: A guide to creating your first ontology, 2001. ,