• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4639566)   Today's Articles (127)   Subscriber (50272)
For: Heartfield R, Loukas G. Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Comput Secur 2018. [DOI: 10.1016/j.cose.2018.02.020] [Citation(s) in RCA: 39] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
Number Cited by Other Article(s)
1
Weichbroth P, Wereszko K, Anacka H, Kowal J. Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments. SENSORS (BASEL, SWITZERLAND) 2023;23:3155. [PMID: 36991866 PMCID: PMC10051655 DOI: 10.3390/s23063155] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/28/2023] [Revised: 03/10/2023] [Accepted: 03/13/2023] [Indexed: 06/19/2023]
2
Apolinário S, Yoshikuni AC, Larieira CLC. Resistance to information security due to users’ information safety behaviors: Empirical research on the emerging markets. COMPUTERS IN HUMAN BEHAVIOR 2023. [DOI: 10.1016/j.chb.2023.107772] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/30/2023]
3
Hilowle M, Yeoh W, Grobler M, Pye G, Jiang F. Users’ Adoption of National Digital Identity Systems: Human-Centric Cybersecurity Review. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2022. [DOI: 10.1080/08874417.2022.2140089] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
4
Improving data quality for human-as-a-security-sensor. A process driven quality improvement approach for user-provided incident information. INFORMATION AND COMPUTER SECURITY 2021. [DOI: 10.1108/ics-06-2020-0100] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
5
Astakhova LV, Medvedev IA. An Information Tool for Increasing the Resistance of Employees of an Organization to Social Engineering Attacks. SCIENTIFIC AND TECHNICAL INFORMATION PROCESSING 2021. [DOI: 10.3103/s0147688221010020] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
6
Astakhova LV. The Validity of Information Security Risk Assessment Methods for Organizations. SCIENTIFIC AND TECHNICAL INFORMATION PROCESSING 2021. [DOI: 10.3103/s014768822004005x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
7
Astakhova LV. A Corporate Employee as a Subject of Corporate Information Security Management. SCIENTIFIC AND TECHNICAL INFORMATION PROCESSING 2020. [DOI: 10.3103/s0147688220020069] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
8
Bullee JW, Junger M. How effective are social engineering interventions? A meta-analysis. INFORMATION AND COMPUTER SECURITY 2020. [DOI: 10.1108/ics-07-2019-0078] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
9
Validation of a socio-technical management process for optimising cybersecurity practices. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.101846] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
10
Fatima R, Yasin A, Liu L, Wang J. How persuasive is a phishing email? A phishing game for phishing awareness. JOURNAL OF COMPUTER SECURITY 2019. [DOI: 10.3233/jcs-181253] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
11
Brett T, Loukas G, Moreno Y, Perra N. Spreading of computer viruses on time-varying networks. Phys Rev E 2019;99:050303. [PMID: 31212481 DOI: 10.1103/physreve.99.050303] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/28/2019] [Indexed: 06/09/2023]
12
Heartfield R, Loukas G, Budimir S, Bezemskij A, Fontaine JR, Filippoupolitis A, Roesch E. A taxonomy of cyber-physical threats and impact in the smart home. Comput Secur 2018. [DOI: 10.1016/j.cose.2018.07.011] [Citation(s) in RCA: 26] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/28/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA