Browse by Author or creator
Albladi, Samar Muslah and Weir, George R. S. (2020) Predicting individuals' vulnerability to social engineering in social networks. Cybersecurity, 3 (1). 7. ISSN 2523-3246
Muslah Albladi, Samar and Weir, George R.S.; (2019) A conceptual model to predict social engineering victims. In: 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3). Institute of Electrical and Electronics Engineers Inc., GBR. ISBN 9781538670019
Albladi, Samar Muslah and Weir, George R.S.; (2018) A semi-automated security advisory system to resist cyber-attack in social networks. In: Computational Collective Intelligence - 10th International Conference, ICCCI 2018, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11055 . Springer-Verlag, GBR, pp. 146-156. ISBN 9783319984421
Albladi, Samar Muslah and Weir, George R.S. (2018) User characteristics that influence judgment of social engineering attacks in social networks. Human-centric Computing and Information Sciences, 8 (1). 5.
Albladi, Samar Muslah and Weir, George R S; Falch, Morten, ed. (2018) Personality traits and cyber-attack victimisation : multiple mediation analysis. In: Joint 13th CTTE and 10th CMI Conference on Internet of Things – Business Models, Users, and Networks. IEEE, DNK. ISBN 9781538631973
Albladi, Samar Muslah and Weir, George R S; (2017) Competence measure in social networks. In: 2017 IEEE International Carnahan Conference on Security Technology (ICCST). IEEE, ESP. ISBN 9781538615850
Albladi, Samar Muslah and Weir, George (2017) Factors affecting user's judgment of cyberattacks. In: International Conference of Big Data in Cybersecurity, 2017-05-10 - 2017-05-10, Edinburgh Napier University.
Albladi, Samar and Weir, George R S; Cartwright, Barry and Weir, George and Lau, Laurie Yiu-Chung, eds. (2016) Vulnerability to social engineering in social networks : a proposed user-centric framework. In: 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF). IEEE, CAN, pp. 95-100. ISBN 9781509060962