Method for identifying cyberattacks based on the use of social engineering over the phone.
Sergii LysenkoOleksandr BokhonkoVolodymyr VorobiyovPiotr GajPublished in: IntelITSIS (2024)
Keyphrases
- experimental evaluation
- high precision
- detection method
- high accuracy
- clustering method
- decision trees
- similarity measure
- error rate
- cost function
- evaluation method
- genetic algorithm
- social interaction
- optimization algorithm
- mobile phone
- classification accuracy
- probabilistic model
- social media
- prior knowledge
- preprocessing
- computational complexity
- objective function
- multiscale