Detection And Mitigation Of Cyber attacks that exploit human vuLnerabilitiES (DAMOCLES 2024)
Abstract
References
Index Terms
- Detection And Mitigation Of Cyber attacks that exploit human vuLnerabilitiES (DAMOCLES 2024)
Recommendations
Towards a human factors assessment questionnaire for cybersecurity incidents
AVI '24: Proceedings of the 2024 International Conference on Advanced Visual InterfacesAssessing human vulnerability in cybersecurity is critical to understanding the relationship between human factors and the security of digital systems. This issue is exacerbated in areas such as public administration due to the sensitive nature of the ...
Human Factors in Phishing Attacks: A Systematic Literature Review
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in digital communication. It is a type of cyber attack often successful because users are not aware of their vulnerabilities or are unable to ...
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures
AbstractSide-channels are unintended pathways within target systems that leak internal information, exploitable via side-channel attack techniques that extract the target information, compromising the system’s security and privacy. Side-channel attacks ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Extended-abstract
- Research
- Refereed limited
Funding Sources
- This work has been supported by the Italian Ministry of University and Research (MUR) under grant PRIN 2022 PNRR DAMOCLES: Detection And Mitigation Of Cyber attacks that exploit human vuLnerabilitiES
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 38Total Downloads
- Downloads (Last 12 months)38
- Downloads (Last 6 weeks)7
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format