Detecting Telephone-based Social Engineering Attacks using Scam Signatures
Abstract
References
Index Terms
- Detecting Telephone-based Social Engineering Attacks using Scam Signatures
Recommendations
How Experts Detect Phishing Scam Emails
CSCWPhishing scam emails are emails that pretend to be something they are not in order to get the recipient of the email to undertake some action they normally would not. While technical protections against phishing reduce the number of phishing emails ...
A Comparative Analysis of Phishing Tools: Features and Countermeasures
Information Security Practice and ExperienceAbstractPhishing is a form of social engineering attack in which targets are contacted by email by someone posing as a legitimate sender to lure the target into sending them sensitive information, such as login information, credit card details, or other ...
Design of Security Training System for Individual Users
A technique to induce access to a website falsely made through a message figured out as being sent by a trustworthy person or a simple spam, circulate a malicious code and cause additional security damage is called Phishing. According to security ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Short-paper
Funding Sources
- National Science Foundation
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 1,588Total Downloads
- Downloads (Last 12 months)550
- Downloads (Last 6 weeks)80
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in