Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015) 2015
DOI: 10.1109/icosc.2015.7050843
|View full text |Cite
|
Sign up to set email alerts
|

Semantic analysis of dialogs to detect social engineering attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…Different personal capabilities of understanding the types of malicious intent of social engineering attacks creates another big challenge in awareness programs [55]. In the past, the approaches of social engineering techniques were more straightforward than they are today.…”
Section: Economicalmentioning
confidence: 99%
“…Different personal capabilities of understanding the types of malicious intent of social engineering attacks creates another big challenge in awareness programs [55]. In the past, the approaches of social engineering techniques were more straightforward than they are today.…”
Section: Economicalmentioning
confidence: 99%
“…Targeted responses employ self-disclosure as a strategic approach for building an engaging conversation (Ravichander and Black 2018). For SE detection, topic models (Bhakta and Harris 2015) and NLP of conversations (Sawa et al 2016) are leveraged. However, all of these approaches are limited to a pre-defined set of topics, constrained by the training corpus.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed and revised SEADMv2 extends the previous model. Bhakta et al [4] argue that the most effective SE attacks involve a dialog between the attacker and the victim. Their approach uses a predefined Topic Blacklist (TBL) against which dialog sentences are checked.…”
Section: Related Workmentioning
confidence: 99%