Generic Taxonomy of Social Engineering Attack
Social engineering is a type of attack that allows unauthorized access to a system to achieve specific objective. Commonly, the purpose is to obtain information for social engineers. Some successful social engineering attacks get victims’ information via human based retrieval approach, example techn...
| Main Authors: | Mohd Foozy, F, Ahmad, R., Abdollah, M. F., Yusof, R., Mas'ud, M. Z. |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/191/ http://eprints.utem.edu.my/id/eprint/191/1/MUiCET_2011_Cik_Feresa_binti_Mohd_Foozy-_by_Feresa.pdf |
Similar Items
A New Generic Taxonomy on Hybrid Malware Detection Technique
by: Yusof, R., et al.
Published: (2009)
by: Yusof, R., et al.
Published: (2009)
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
An Improved Traditional Worm Attack Pattern
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
Threshold verification using Statistical Approach for Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
A New Malware Attack Pattern Generalization
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
New Multi-step Worm Attack Model
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Host Based Detection Approach using Time Based
Module for Fast Attack Detection Behavior
by: Abdollah, M. F., et al.
Published: (2011)
by: Abdollah, M. F., et al.
Published: (2011)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Advanced Trace Pattern For Computer Intrusion Discovery
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
Scenario Based Worm Trace Pattern Identification Technique
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
Virtual Machine based Autonomous Web Server
by: Mas’ud, M. Z., et al.
Published: (2011)
by: Mas’ud, M. Z., et al.
Published: (2011)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Systematic literature review and taxonomy for DDoS attack detection and prediction
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
Network Administration & Management
by: Yusof, R., et al.
Published: (2007)
by: Yusof, R., et al.
Published: (2007)
Alert Correlation Technique Analysis For Diverse Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
Global distribution and taxonomy of extant horseshoe crabs
by: B, Akbar John, et al.
Published: (2011)
by: B, Akbar John, et al.
Published: (2011)
Comparing the usability and reliability of a generic and a domain-specific medical error taxonomy
by: Taib, Ibrahim Adham, et al.
Published: (2012)
by: Taib, Ibrahim Adham, et al.
Published: (2012)
State-of-the-art digital watermarking attacks
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Taxonomy of Wireless Sensor Network Cyber Security Attacks in the Oil and Gas Industries
by: Rahmand, Pedram, et al.
Published: (2010)
by: Rahmand, Pedram, et al.
Published: (2010)
Traceability in Digital Forensic Investigation
Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Threshold verification using statistical approach for fast attack detection
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
A preliminary propagation tool in social engineering attacks
by: Hoong, Peggy
Published: (2021)
by: Hoong, Peggy
Published: (2021)
Growth of knowledge on the reptiles of India, with an introduction to systematics, taxonomy and nomenclature
by: Das, I.
Published: (2003)
by: Das, I.
Published: (2003)
Rice Husk Ash for Enhancing Salts Attack Resistance of Blended Cement Containing Metakoalin
by: Shatat, Mohamed R., et al.
Published: (2014)
by: Shatat, Mohamed R., et al.
Published: (2014)
Taxonomy and biogeography of Sundaland Gardenia (Rubiaceae) / Low Yee Wen
by: Low , Yee Wen
Published: (2010)
by: Low , Yee Wen
Published: (2010)
Flooding Distributed Denial of Service Attacks-A Review
by: Wan Mohd Ghazali, Khadijah, et al.
Published: (2011)
by: Wan Mohd Ghazali, Khadijah, et al.
Published: (2011)
Performance Enhancements in IEEE 802.11 DCF MANET through Variation of SIFS Values in Distance Vector Routing Environment
by: Md Khambari, M. N., et al.
Published: (2011)
by: Md Khambari, M. N., et al.
Published: (2011)
Taxonomy of cat gecko, aeluroscalabotes felinus complex in south east asia
by: Siti Nor Baizurah, Bt Abd Malik Chang.
Published: (2012)
by: Siti Nor Baizurah, Bt Abd Malik Chang.
Published: (2012)
Development of actors and artefacts taxonomy for social research network sites
by: Ruzainisuhanaliza, Abdul Muni
Published: (2018)
by: Ruzainisuhanaliza, Abdul Muni
Published: (2018)
Mitigating sulphate attacks in geotechnical engineering
by: Chegenizadeh, Amin, et al.
Published: (2017)
by: Chegenizadeh, Amin, et al.
Published: (2017)
Taxonomy and phylogeny of crustose brown algae (Phaeophyceae) from Malaysia and Lombok Island, Indonesia
/ Poong Sze Wan
by: Poong, Sze Wan
Published: (2014)
by: Poong, Sze Wan
Published: (2014)
Taxonomy and phylogenetics of Malaysian sargassum species (Fucales, Phaeophyceae) / Ng Woan Shien
by: Ng, Woan Shien
Published: (2013)
by: Ng, Woan Shien
Published: (2013)
Similar Items
-
A New Generic Taxonomy on Hybrid Malware Detection Technique
by: Yusof, R., et al.
Published: (2009) -
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2010) -
An Improved Traditional Worm Attack Pattern
by: Yusof, R., et al.
Published: (2010) -
Threshold verification using Statistical Approach for Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2009) -
A New Malware Attack Pattern Generalization
by: Yusof, R., et al.
Published: (2011)