Social Engineering Cybercrime Evidence Analysis Using Formal Concept Analysis
| dc.contributor.author | Senkyire I.B. | |
| dc.contributor.author | Kester Q.-A. | |
| dc.date.accessioned | 2025-03-06T18:11:43Z | |
| dc.date.accessioned | 2025-03-06T18:58:53Z | |
| dc.date.issued | 2021 | |
| dc.description.abstract | Social engineering which is otherwise known as human piracy, is the art of phishing and tracing a target to reveal his or her credentials in order to access networks or accounts. It employs deceptive and manipulative mechanisms on a target or just a follow-up, discovery, and curiosity[1]. Currently, the biggest threats facing cybersecurity are social engineering attacks. 84% of cyber-attacks are reported to have been conducted by social engineers with high success rates and such attacks have cost companies billions of dollars, which is far more than the cost of natural disasters[2]. Social engineering attacks can be detected but cannot be stopped nonetheless, evidence(s) of such cybercrime necessitates examination and analysis. In this paper, we propose Formal Concept Analysis for the analysis of social engineering cybercrime evidence. � 2021 IEEE. | |
| dc.identifier.doi | 10.1109/ICSIoT55070.2021.00014 | |
| dc.identifier.isbn | 978-166547878-6 | |
| dc.identifier.uri | http://162.250.124.58:4000/handle/123456789/319 | |
| dc.language.iso | en | |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
| dc.source | Proceedings - 2021 International Conference on Cyber Security and Internet of Things, ICSIoT 2021 | |
| dc.subject | attacker | |
| dc.subject | cyber security | |
| dc.subject | cybercrime | |
| dc.subject | human piracy | |
| dc.subject | phishing | |
| dc.subject | social engineering | |
| dc.subject | target | |
| dc.title | Social Engineering Cybercrime Evidence Analysis Using Formal Concept Analysis | |
| dc.type | Other | |
| oaire.citation.conferenceDate | 15 December 2021 through 17 December 2021 | |
| oaire.citation.conferencePlace | Virtual, Online |
