Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Pavlo Burda"'
Publikováno v:
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems.
Publikováno v:
Foundations and Practice of Security ISBN: 9783031301216
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6c672f89937f5cc5a61a3529033b987f
https://doi.org/10.1007/978-3-031-30122-3_27
https://doi.org/10.1007/978-3-031-30122-3_27
Publikováno v:
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
Publikováno v:
EuroS&P Workshops
In this paper we present, showcase, and analize a novel framework to dissect Social Engineering (SE) attacks. The framework is based on extant theories in the cognitive sciences, and is meant as an instrument for researchers and practitioners alike t
Publikováno v:
ARES
Phishing attacks arrive in high numbers and often spread quickly, meaning that after-the-fact countermeasures such as domain blacklisting are limited in efficacy. Visual similarity-based approaches have the potential of detecting previously unseen ph
Publikováno v:
EuroS&P Workshops
Organizations are increasingly facing sophisticated social engineering attacks that exploit human vulnerabilities and overcome commonly available countermeasures. Spear-phishing campaigns are becoming the most prevalent attack and source of compromis
Publikováno v:
ARES
Organizations are experiencing more and more sophisticated attacks specifically targeting their employees and customers. These attacks exploit tailored information on the victim or organization to increase their credibility. To date, no study has eva
Publikováno v:
ARES
Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019
The Darkweb hosts a number of legal and illegal services that are hard to reach due to the lack, by design, of a regular ‘name service’ as those operated by DNSs on the clearnet. This difficulty, together with the continuous appearance of decoy m
Publikováno v:
EuroS&P Workshops
Proceedings-4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019, 433-442
STARTPAGE=433;ENDPAGE=442;TITLE=Proceedings-4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019
Proceedings-4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019, 433-442
STARTPAGE=433;ENDPAGE=442;TITLE=Proceedings-4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019
The monitoring of underground criminal activities is often automated to maximize the data collection and to train ML models to automatically adapt data collection tools to different communities. On the other hand, sophisticated adversaries may adopt
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::eb010dd39ff65a96977223e17ca97959
https://doi.org/10.1109/eurospw.2019.00055
https://doi.org/10.1109/eurospw.2019.00055