4.6 Article

Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks

Related references

Note: Only part of the references are listed.
Article Psychology, Applied

Social distance, trust and getting hooked: A phishing expedition

Sean R. Martin et al.

Summary: Phishing is a message-based computer attack sent via email to deceive and exploit recipients, putting sensitive personal and organizational data at risk. Despite difficulties in determining actual social distance and intentions, people rely on category-based signals to establish trust, increasing the likelihood of deception. Results from a validation study and a randomized field experiment sending phishing emails to all employees of an insurance company are presented.

ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES (2021)

Proceedings Paper Computer Science, Information Systems

FORENSIC ANALYSIS OF ADVANCED PERSISTENT THREAT ATTACKS IN CLOUD ENVIRONMENTS

Changwei Liu et al.

ADVANCES IN DIGITAL FORENSICS XVI (2020)

Proceedings Paper Computer Science, Theory & Methods

Towards Scientific Incident Response

Jonathan M. Spring et al.

DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2018 (2018)

Article Computer Science, Information Systems

A novel kill-chain framework for remote security log analysis with SIEM software

Blake D. Bryant et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Information Systems

CuFA: A more formal definition for digital forensic artifacts

Vikram S. Harichandran et al.

DIGITAL INVESTIGATION (2016)

Proceedings Paper Computer Science, Theory & Methods

Cyber-Attack Modeling Analysis Techniques: An Overview

Hamad AL-Mohannadi et al.

2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW) (2016)

Review Computer Science, Hardware & Architecture

Intrusion detection system: A comprehensive review

Hung-Jen Liao et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)