Sign in

Two methodologies for physical penetration testing using social engineering.

Trajce DimkovWolter PietersPieter H. Hartel
Published in: ACSAC (2010)
Keyphrases
  • penetration testing
  • artificial intelligence
  • social media
  • social networks
  • real world
  • security vulnerabilities
  • software engineering
  • data mining
  • association rules