Related references
Note: Only part of the references are listed.Social distance, trust and getting hooked: A phishing expedition
Sean R. Martin et al.
ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES (2021)
FORENSIC ANALYSIS OF ADVANCED PERSISTENT THREAT ATTACKS IN CLOUD ENVIRONMENTS
Changwei Liu et al.
ADVANCES IN DIGITAL FORENSICS XVI (2020)
Towards Scientific Incident Response
Jonathan M. Spring et al.
DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2018 (2018)
A novel kill-chain framework for remote security log analysis with SIEM software
Blake D. Bryant et al.
COMPUTERS & SECURITY (2017)
CuFA: A more formal definition for digital forensic artifacts
Vikram S. Harichandran et al.
DIGITAL INVESTIGATION (2016)
Cyber-Attack Modeling Analysis Techniques: An Overview
Hamad AL-Mohannadi et al.
2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW) (2016)
Intrusion detection system: A comprehensive review
Hung-Jen Liao et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)