Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Seung Jun | - |
dc.contributor.author | Lee, Seok Won | - |
dc.date.issued | 2018-01-01 | - |
dc.identifier.issn | 1865-0929 | - |
dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/36256 | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85041120499&origin=inward | - |
dc.description.abstract | APT attacks are increasing every year, and these APT attacks begin with social engineering attacks. In order to be effective in blocking APT attacks, blocking social engineering attacks make it possible to prevent APT attacks in advance. In this study, we define human factors which greatly influence social engineering attacks, and make it possible to obtain appropriate security requirements by modeling the relationships among human vulnerability, social engineering attacks and security requirements. | - |
dc.description.sponsorship | Acknowledgement. This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2017R1D1A1B03034279). | - |
dc.description.sponsorship | This research was supported by the MIST(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW supervised by the IITP (Institute for Information & communications Technology Promotion) (20150009080031001). | - |
dc.description.sponsorship | This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2017R1D1A1B03034279). This research was supported by the MIST(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW supervised by the IITP (Institute for Information & communications Technology Promotion) (20150009080031001). | - |
dc.language.iso | eng | - |
dc.publisher | Springer Verlag | - |
dc.subject.mesh | Advanced persistent threat | - |
dc.subject.mesh | Security requirements | - |
dc.subject.mesh | Social engineering | - |
dc.title | Social engineering based security requirements elicitation model for advanced persistent threats | - |
dc.type | Conference | - |
dc.citation.conferenceDate | 2017.11.9. ~ 2017.11.10. | - |
dc.citation.conferenceName | 4th Symposium on Asia-Pacific Requirements Engineering Symposium, APRES 2017 | - |
dc.citation.edition | Requirements Engineering for Internet of Things - 4th Asia-Pacific Symposium, APRES 2017, Proceedings | - |
dc.citation.endPage | 40 | - |
dc.citation.startPage | 29 | - |
dc.citation.title | Communications in Computer and Information Science | - |
dc.citation.volume | 809 | - |
dc.identifier.bibliographicCitation | Communications in Computer and Information Science, Vol.809, pp.29-40 | - |
dc.identifier.doi | 10.1007/978-981-10-7796-8_3 | - |
dc.identifier.scopusid | 2-s2.0-85041120499 | - |
dc.identifier.url | http://www.springer.com/series/7899 | - |
dc.subject.keyword | Advanced persistent threat | - |
dc.subject.keyword | Human factor | - |
dc.subject.keyword | Ontology | - |
dc.subject.keyword | Security requirement | - |
dc.subject.keyword | Social engineering attack | - |
dc.type.other | Conference Paper | - |
dc.description.isoa | false | - |
dc.subject.subarea | Computer Science (all) | - |
dc.subject.subarea | Mathematics (all) | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.