Ajou University repository

Social engineering based security requirements elicitation model for advanced persistent threats
Citations

SCOPUS

0

Citation Export

DC Field Value Language
dc.contributor.authorKim, Seung Jun-
dc.contributor.authorLee, Seok Won-
dc.date.issued2018-01-01-
dc.identifier.issn1865-0929-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/36256-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85041120499&origin=inward-
dc.description.abstractAPT attacks are increasing every year, and these APT attacks begin with social engineering attacks. In order to be effective in blocking APT attacks, blocking social engineering attacks make it possible to prevent APT attacks in advance. In this study, we define human factors which greatly influence social engineering attacks, and make it possible to obtain appropriate security requirements by modeling the relationships among human vulnerability, social engineering attacks and security requirements.-
dc.description.sponsorshipAcknowledgement. This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2017R1D1A1B03034279).-
dc.description.sponsorshipThis research was supported by the MIST(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW supervised by the IITP (Institute for Information & communications Technology Promotion) (20150009080031001).-
dc.description.sponsorshipThis research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2017R1D1A1B03034279). This research was supported by the MIST(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW supervised by the IITP (Institute for Information & communications Technology Promotion) (20150009080031001).-
dc.language.isoeng-
dc.publisherSpringer Verlag-
dc.subject.meshAdvanced persistent threat-
dc.subject.meshSecurity requirements-
dc.subject.meshSocial engineering-
dc.titleSocial engineering based security requirements elicitation model for advanced persistent threats-
dc.typeConference-
dc.citation.conferenceDate2017.11.9. ~ 2017.11.10.-
dc.citation.conferenceName4th Symposium on Asia-Pacific Requirements Engineering Symposium, APRES 2017-
dc.citation.editionRequirements Engineering for Internet of Things - 4th Asia-Pacific Symposium, APRES 2017, Proceedings-
dc.citation.endPage40-
dc.citation.startPage29-
dc.citation.titleCommunications in Computer and Information Science-
dc.citation.volume809-
dc.identifier.bibliographicCitationCommunications in Computer and Information Science, Vol.809, pp.29-40-
dc.identifier.doi10.1007/978-981-10-7796-8_3-
dc.identifier.scopusid2-s2.0-85041120499-
dc.identifier.urlhttp://www.springer.com/series/7899-
dc.subject.keywordAdvanced persistent threat-
dc.subject.keywordHuman factor-
dc.subject.keywordOntology-
dc.subject.keywordSecurity requirement-
dc.subject.keywordSocial engineering attack-
dc.type.otherConference Paper-
dc.description.isoafalse-
dc.subject.subareaComputer Science (all)-
dc.subject.subareaMathematics (all)-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Lee, Seok-Won Image
Lee, Seok-Won이석원
Department of Software and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.