Social Engineering: I-E based Model of Human Weakness for Attack and Defense Investigations

Wenjun Fan, Lwakatare Kevin, Rong Rong

Research output: Contribution to journalArticlepeer-review

Original languageEnglish
Pages (from-to)1-11
Number of pages11
JournalIJ Computer Network and Information Security
Volume9
Issue number1
Publication statusPublished - 2017
Externally publishedYes

Keywords

  • Social Engineering

Cite this