Social Engineering for Security Attacks.
Jennifer NelsonX. LinC. ChenJ. IglesiasJ. Jenny LiPublished in: MISNC (2016)
Keyphrases
- security threats
- security mechanisms
- security problems
- java card
- security protocols
- cyber attacks
- computer security
- security breaches
- security vulnerabilities
- security measures
- countermeasures
- denial of service attacks
- security issues
- social interaction
- information security
- malicious users
- security requirements
- security risks
- cryptographic protocols
- chosen plaintext
- intrusion detection
- border security
- stream cipher
- malicious attacks
- secure routing
- security flaws
- intrusion prevention
- insider attacks
- network security
- software engineering
- social media
- fault injection
- biometric template
- computer science
- key management
- identity theft
- information leakage
- buffer overflow
- intrusion detection and prevention
- cyber security
- social networks
- smart card
- social networking
- dos attacks
- computer networks
- security management
- sql injection
- security policies
- security analysis