| International Journal of Nonlinear Analysis and Applications | ||
| Volume 12, Special Issue, January 0, Pages 415-424 PDF (697.79 K) | ||
| DOI: 10.22075/ijnaa.2021.5279 | ||
| Receive Date: 14 April 2021, Revise Date: 24 May 2021, Accept Date: 10 June 2021 | ||
| References | ||
|
[1] D. Airehrour, Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model, mdpi, Information 2018, 9, 110; DOI:10.3390/info9050110. [2] Anatomy of an attack, available online: http://blogs.rsa.com/anatomy-of-an-attack/, last accessed on 2013. [3] T. Huang and Y. Zhao, Revolution of securities law in the Internet age: A review on equity crowd-funding, Comput. Law Secur. Rev., 33(6), 2017, pp. 802810 [4] T. Jagatic, N. Johnson, M. Jakobsson and F. Menczer,Social phishing, Communications of the ACM, 50(10) 2007 94-100. [5] D. JAVAHERI, Detection and Elimination of Spyware and Ransom ware by Intercepting Kernel-Level System Routines, IEEE, 6, 2018. [6] K. Krombholz, Advanced Social Engineering Attacks, Preprint submitted to Journal of Information Security and Applications, Journal of Information Security and Applications, 2014, DOI: 10.1016/j.jisa.2014.09.005. [7] Dr. G. Padmavathi and D. Shanmugapriya, A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks, International Journal of Computer Science and Information Security, 4(1&2), 2009. [8] PriceWaterhouseCoopers. Adjusting the Lens on Economic Crime; PriceWaterhouseCoopers (PWC): Auckland,New Zealand, 2016.[9] S. Suman and Shubhangi, A Survey On Comparison Of Secure Routing Protocols in Wireless Sensor Networks, International Journal of Wireless Communications and Networking Technologies, 5(3), April - May 2016. [10] US Department of the Treasury. Financial Services Sector-Specific Plan; US Department of the Treasury: New York, NY, USA, 2015. [11] G. L. White, Education and prevention relationships on security incidents for home computers, J. Comput. Inf. Syst., 55(3), 2015, pp. 29-37. [12] K. Xing, S. S. R. Srinivasan, M Rivera, J. Li and X. Cheng, Attacks and Countermeasures in Sensor Networks: A Survey, Network security, Springer, 2005. | ||
|
Statistics Article View: 44,560 PDF Download: 50,150 |
||