I. S. Winkler and B. Dealy, Information security technology? ...don't rely on it: A case study in social engineering, Proceedings of the 5th Conference on USENIX UNIX Security Symposium -Volume 5. SSYM'95, pp.1-1, 1995.

K. D. Mitnick and W. L. Simon, The art of deception: controlling the human element of security, 2002.

M. Uschold and M. Gruninger, Ontologies and semantics for seamless connectivity, ACM SIGMOD Record, vol.33, issue.4, pp.58-64, 2004.
DOI : 10.1145/1041410.1041420

J. Quann and P. Belford, The hack attack - Increasing computer system awareness of vulnerability threats, 3rd Applying Technology to Systems; Aerospace Computer Security Conference, pp.155-157, 1987.
DOI : 10.2514/6.1987-3093

H. Kluepfel, Foiling the wiley hacker: more than analysis and containment, Proceedings. International Carnahan Conference on Security Technology, pp.15-21, 1989.
DOI : 10.1109/CCST.1989.751947

H. Kluepfel, In search of the cuckoo's nest (computer security), Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology, pp.181-191, 1991.
DOI : 10.1109/CCST.1991.202213

E. Goldstein, The Best of 2600, Collector's Edition: A Hacker Odyssey, 2009.

T. Thornburgh, Social engineering, Proceedings of the 1st annual conference on Information security curriculum development , InfoSecCD '04, pp.133-135, 2004.
DOI : 10.1145/1059524.1059554

M. Nohlberg, Securing Information Assets: Understanding, Measuring and Protecting against Social Engineering Attacks, 2008.

S. Abraham and I. Chengalur-smith, An overview of social engineering malware: Trends, tactics, and implications, Technology in Society, vol.32, issue.3, pp.183-196, 2010.
DOI : 10.1016/j.techsoc.2010.07.001

M. Erbschloe, Trojans, worms, and spyware: a computer security professional's guide to malicious code, 2004.

Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, The socialbot network, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, pp.93-102, 2011.
DOI : 10.1145/2076732.2076746

Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, Design and analysis of a social botnet, 2013) 556 ? 578 <ce:title>Botnet Activity: Analysis, Detection and Shutdown</ce:title>
DOI : 10.1016/j.comnet.2012.06.006

D. Kvedar, M. Nettis, and S. P. Fulton, The use of formal social engineering techniques to identify weaknesses during a computer vulnerability competition, Journal of Computing Sciences in Colleges, vol.26, issue.2, pp.80-87, 2010.

M. Mcdowell, Cyber security tip st04-0141, avoiding social engineering and phishing attacks, 2013.

J. A. Cruz, Social engineering and awareness training, 2010.

A. M. Culpepper, Effectiveness of using red teams to identify maritime security vulnerabilities to terrorist attack. Master's thesis, Naval Postgraduate School, 2004.

D. Mills, Analysis of a social engineering threat to information security exacerbated by vulnerabilities exposed through the inherent nature of social networking websites, 2009 Information Security Curriculum Development Conference on, InfoSecCD '09, pp.139-141, 2009.
DOI : 10.1145/1940976.1941003

Q. Doctor, E. Dulaney, and T. Skandier, CompTIA A+ Complete Study Guide, 2007.

J. Hamill, R. F. Deckro, and J. M. Jr, Evaluating information assurance strategies, Decision Support Systems, vol.39, issue.3, pp.463-484, 2005.
DOI : 10.1016/j.dss.2003.11.004

J. T. Hamill, Modeling information assurance: A value focused thinking approach. Master's thesis, Air Force Institute of Technology, 2000.

M. Braverman, Behavioural modelling of social engineering-based malicious software, Virus Bulletin Conf, 2006.

R. M. Åhlfeldt, P. Backlund, B. Wangler, and E. Söderström, Security issues in health care process integration? a research-in-progress report, 2005.

S. Granger, Social engineering fundamentals, part i: Hacker tactics, 2001.

A. Schoeman, B. Irwin, and J. Richter, Social recruiting: a next generation social engineering attack, Uses in Warfare and the Safeguarding of Peace, 2012.

C. Hadnagy, Social Engineering: The Art of Human Hacking, 2010.

J. Espinhara and U. Albuquerque, Using online activity as digital fingerprints to create a better spear phisher, 2013.

H. Nemati, Pervasive Information Security and Privacy Developments: Trends and Advancements. First edition edn, Information Science Reference, 2010.
DOI : 10.4018/978-1-61692-000-5

I. Mcquade and S. C. , Understanding and managing cybercrime, 2006.

M. Spinapolice, Mitigating the risk of social engineering attacks, 2011.

J. J. Lenkart, The vulnerability of social networking media and the insider threat new eyes for bad guys, Naval Postgraduate School, 2011.

M. Bezuidenhout, F. Mouton, and H. Venter, Social engineering attack detection model: SEADM, 2010 Information Security for South Africa, pp.1-8, 2010.
DOI : 10.1109/ISSA.2010.5588500

F. Mouton, M. Malan, and H. Venter, Development of cognitive functioning psychological measures for the seadm, In: Human Aspects of Information Security & Assurance, 2012.

F. Mouton, M. M. Malan, and H. S. Venter, Social engineering from a normative ethics perspective, 2013 Information Security for South Africa, pp.1-8, 2013.
DOI : 10.1109/ISSA.2013.6641064

K. Ezechi and A. , Detecting and combating malware, 2011.

D. Harley, Re-floating the titanic: Dealing with social engineering attacks, European Institute for Computer Antivirus Research, 1998.

L. Laribee, Development of methodical social engineering taxonomy project. Msc, Naval Postgraduate School, 2006.

K. Ivaturi and L. Janczewski, A taxonomy for social engineering attacks, International Conference on Information Resources Management, Centre for Information Technology, Organizations, and People, 2011.

M. Foozy, F. Ahmad, R. Abdollah, M. Yusof, R. Mas-'ud et al., Generic taxonomy of social engineering attack, Malaysian Technical Universities International Conference on Engineering & Technology, 2011.

P. Tetri and J. Vuorinen, Dissecting social engineering, Behaviour & Information Technology, vol.13, issue.9, pp.1014-1023, 2013.
DOI : 10.1002/asi.20779

R. Van-rees, Clarity in the usage of the terms ontology, taxonomy and classification, CIB REPORT, vol.284, issue.432, pp.1-8, 2003.

T. R. Gruber, A translation approach to portable ontology specifications. Knowledge Acquisition -Special issue: Current issues in knowledge modeling, pp.199-220, 1993.

N. F. Noy and D. L. Mcguinness, Ontology development 101: A guide to creating your first ontology, 2001.