Vol-3674⫷ Vol-3675 ⫸Vol-3676
urn:nbn:de:0074-3675-0


Vol-3675/paper22⫷Vol-3675/paper23⫸Vol-3675/paper24

Method for identifying cyberattacks based on the use of social engineering over the phone