Login / Signup
Two methodologies for physical penetration testing using social engineering.
Trajce Dimkov
Wolter Pieters
Pieter H. Hartel
Published in:
ACSAC (2010)
Keyphrases
</>
penetration testing
artificial intelligence
social media
social networks
real world
security vulnerabilities
software engineering
data mining
association rules