Abstract

The need to detect attacks based on social engineering techniques has put researchers in the position of building different tools, observation grids or even theories able to capture different behaviors specific to simulated behavior. Although phishing is the main attack vector used in most cybersecurity offensive playbooks, the most effective attacks involve dialogue between the attacker and the target. This paper explores threat detection using semantic analysis performed with "Tropes" software.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call