From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Susceptibility to Social Engineering in Social Networking Sites: The Case of Facebook., , и . ICIS, Association for Information Systems, (2015)Toward Predicting Susceptibility to Phishing Victimization on Facebook., , и . SCC, стр. 419-426. IEEE Computer Society, (2016)Social engineering in social networking sites: Affect-based model., , , и . ICITST, стр. 508-515. IEEE, (2013)Inattentional Blindness Factors that Make People Vulnerable to Security Threats in Social Networking Sites.. J. Comput., 14 (3): 184-194 (2019)Measuring Source Credibility of Social Engineering Attackers on Facebook., , и . HICSS, стр. 3686-3695. IEEE Computer Society, (2016)Social Engineering in Social Networking sites: How Good becomes evil., , , и . PACIS, стр. 271. (2014)Character-level word encoding deep learning model for combating cyber threats in phishing URL detection., , , и . Comput. Electr. Eng., (2022)Social Engineering in Social Networking Sites: The Art of Impersonation., , и . IEEE SCC, стр. 797-804. IEEE Computer Society, (2014)An Open Tool Architecture for Security Testing of NoSQL-Based Applications., , , , , и . AICCSA, стр. 220-225. IEEE Computer Society, (2017)The Historical Relationship between the Software Vulnerability Lifecycle and Vulnerability Markets: Security and Economic Risks.. Comput., 11 (9): 137 (2022)