Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 4,452
1.
  • Renovating Russia Renovating Russia
    Beer, Daniel 06/2008
    eBook

    Renovating Russiais a richly comparative investigation of late Imperial and early Soviet medico-scientific theories of moral and social disorder. Daniel Beer argues that in the late Imperial years ...
Full text
Available for: NUK, ODKLJ, UL, UM, UPUK
2.
  • Social engineering attack e... Social engineering attack examples, templates and scenarios
    Mouton, Francois; Leenen, Louise; Venter, H.S. Computers & security, June 2016, 2016-06-00, 20160601, Volume: 59
    Journal Article
    Peer reviewed
    Open access

    The field of information security is a fast-growing discipline. Even though the effectiveness of security measures to protect sensitive information is increasing, people remain susceptible to ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP

PDF
3.
Full text
4.
  • A Comprehensive Taxonomy of... A Comprehensive Taxonomy of Social Engineering Attacks and Defense Mechanisms: Toward Effective Mitigation Strategies
    Zaoui, Mohamed; Yousra, Belfaik; Yassine, Sadqi ... IEEE access, 2024, Volume: 12
    Journal Article
    Peer reviewed
    Open access

    Social engineering (SE) attacks are a growing concern for organizations that rely on technology to protect sensitive data. Identifying and preventing these attacks can be challenging, as they ...
Full text
Available for: NUK, UL, UM, UPUK
5.
Full text

PDF
6.
  • The Social Engineering Opti... The Social Engineering Optimizer (SEO)
    Fathollahi-Fard, Amir Mohammad; Hajiaghaei-Keshteli, Mostafa; Tavakkoli-Moghaddam, Reza Engineering applications of artificial intelligence, 06/2018, Volume: 72
    Journal Article
    Peer reviewed

    Although several meta-heuristics have been developed in the last two decades, most of them are population-based, undergo many steps along with several parameters that make them hard to understand and ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
7.
  • Novel modifications of soci... Novel modifications of social engineering optimizer to solve a truck scheduling problem in a cross-docking system
    Fathollahi-Fard, Amir Mohammad; Ranjbar-Bourani, Mehdi; Cheikhrouhou, Naoufel ... Computers & industrial engineering, 11/2019, Volume: 137
    Journal Article
    Peer reviewed
    Open access

    •A Social Engineering Optimizer (SEO) is newly developed to solve the truck scheduling problem.•Three novel improvements for the SEO are proposed.•The algorithms are evaluated by using different test ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
8.
  • An Enhanced Social Engineer... An Enhanced Social Engineering Optimizer for Solving an Energy-Efficient Disassembly Line Balancing Problem Based on Bucket Brigades and Cloud Theory
    Tian, Guangdong; Zhang, Cheng; Fathollahi-Fard, Amir M. ... IEEE transactions on industrial informatics, 05/2023, Volume: 19, Issue: 5
    Journal Article

    A disassembly line is an industrialized and automated production line which should be scheduled with high production efficiency. Although many disassembly line balancing optimization studies are ...
Full text
Available for: IJS, NUK, UL
9.
  • Social engineering: the art... Social engineering: the art of human hacking
    Christopher Hadnagy, Hadnagy 06/2018
    eBook

    Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire-why hack into something when you could ...
Full text
Available for: UPUK
10.
  • Reverse Social Engineering ... Reverse Social Engineering to Counter Social Engineering in Mobile Money Theft: A Tanzanian Context
    Kilavo, Hassan; J. Mselle, Leonard; I. Rais, Ramadhani ... Journal of applied security research, 07/2023, Volume: 18, Issue: 3
    Journal Article
    Peer reviewed

    Social engineering entails deception where one manipulates individuals into divulging confidential or any personal information that may be used for fraudulent purposes. In mobile money theft, the ...
Full text
Available for: BFBNIB, NUK, PILJ, SAZU, UL, UM, UPUK
1 2 3 4 5
hits: 4,452

Load filters