Detecting Telephone-based Social Engineering Attacks using Scam Signatures.
Ali DerakhshanIan G. HarrisMitra BehzadiPublished in: IWSPA@CODASPY (2021)
Keyphrases
- identity theft
- malicious activities
- social networks
- social interaction
- computer science
- network intrusion detection systems
- social networking
- social media
- digital images
- software engineering
- malicious traffic
- engineering design
- security protocols
- countermeasures
- malicious attacks
- malicious users
- misuse detection
- network traffic
- call center
- computer security
- social context
- social networking sites
- signature verification
- engineering problems
- artificial intelligence
- watermarking scheme
- intrusion detection system
- design process
- intrusion detection
- anomaly detection
- detecting malicious