Now showing items 1-10 of 3
Bidirectional communication (3) |
Indirect communication (3) |
Social engineering attack framework (3) |
Unidirectional communication (3) |
Mitnick's attack cycle (2) |
Social engineering (2) |
Social engineering attack detection model (2) |
Social engineering attack examples (2) |
Finite state machine (1) |
Information security (1) |
Now showing items 1-10 of 3