2015 International Conference on Cyberworlds (CW) 2015
DOI: 10.1109/cw.2015.52
|View full text |Cite
|
Sign up to set email alerts
|

Social Engineering Attack Detection Model: SEADMv2

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
4

Relationship

3
6

Authors

Journals

citations
Cited by 28 publications
(20 citation statements)
references
References 7 publications
0
20
0
Order By: Relevance
“…Also, the authors will use these templates to expand on existing research on social engineering attack detection models and to propose specific attack detection models for each type of communication. [60] …”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, the authors will use these templates to expand on existing research on social engineering attack detection models and to propose specific attack detection models for each type of communication. [60] …”
Section: Resultsmentioning
confidence: 99%
“…In previous research, the authors proposed a social engineering attack detection model (SEADM) which was designed to allow users of the model to be more vigilant against social engineering attacks [60]. The model is depicted in Figure 3.…”
Section: Application Of the Social Engineering Attack Templatesmentioning
confidence: 99%
“…In Heartfield and Loukas (2018) the authors show that the human factor is the weakest link in social engineering attacks and based on a human study the prove that. In Bezuidenhout et al (2010) and Mouton et al (2015) the authors provide a theoretical foundation that potentially could be used in real systems to detect attacks. In the works of Nicholson et al (2017) it is explained how social engineering attacks can potentially be detected, whereas in Krombholz et al (2015) and Mouton et al (2016) different examples of attacks with scenarios are presented.…”
Section: Related Workmentioning
confidence: 99%
“…The authors have previously performed research within the field of social engineering that focused on formalising and expanding upon concepts in the field. This research included proposing a social engineering attack framework, providing social engineering attack examples, considering ethical questions relating to social engineering, and both developing and revising the Social Engineering Attack Detection Model (SEADM) [11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%