Author of the publication

An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks.

, , and . SERA, page 371-378. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Prototype Framework for Assessing Information Provenance in Decentralised Social Media: The EUNOMIA Concept., , , , and . e-Democracy, volume 1111 of Communications in Computer and Information Science, page 196-208. Springer, (2019)On the Feasibility of Automated Semantic Attacks in the Cloud., and . ISCIS, page 343-351. Springer, (2012)Evaluating the reliability of users as human sensors of social media security threats., and . CyberSA, page 1-7. IEEE, (2016)An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks., , and . SERA, page 371-378. IEEE, (2017)Utilising the concept of human-as-a-security-sensor for detecting semantic social engineering attacks.. University of Greenwich, Greenwich Campus, London, UK, (2017)British Library, EThOS.Predicting the performance of users as human sensors of security threats in social media., and . Int. J. Cyber Situational Aware., 1 (1): 110-129 (2016)A Prototype Deep Learning Paraphrase Identification Service for Discovering Information Cascades in Social Networks., , , , , and . ICME Workshops, page 1-4. IEEE, (2020)Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework., and . Comput. Secur., (2018)A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks., and . ACM Comput. Surv., 48 (3): 37:1-37:39 (2016)You Are Probably Not the Weakest Link: Towards Practical Prediction of Susceptibility to Semantic Social Engineering Attacks., , and . IEEE Access, (2016)