Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/intelitsis/LysenkoBVG24
%A Lysenko, Sergii
%A Bokhonko, Oleksandr
%A Vorobiyov, Volodymyr
%A Gaj, Piotr
%B IntelITSIS
%D 2024
%E Hovorushchenko, Tetiana
%E Savenko, Oleg
%E Popov, Peter T.
%E Lysenko, Sergii
%I CEUR-WS.org
%K dblp
%P 318-329
%T Method for identifying cyberattacks based on the use of social engineering over the phone.
%U http://dblp.uni-trier.de/db/conf/intelitsis/intelitsis2024.html#LysenkoBVG24
%V 3675
@inproceedings{conf/intelitsis/LysenkoBVG24,
added-at = {2024-05-13T00:00:00.000+0200},
author = {Lysenko, Sergii and Bokhonko, Oleksandr and Vorobiyov, Volodymyr and Gaj, Piotr},
biburl = {https://www.bibsonomy.org/bibtex/29c55287097ead5e063b62fadcbbb4505/dblp},
booktitle = {IntelITSIS},
crossref = {conf/intelitsis/2024},
editor = {Hovorushchenko, Tetiana and Savenko, Oleg and Popov, Peter T. and Lysenko, Sergii},
ee = {https://ceur-ws.org/Vol-3675/paper23.pdf},
interhash = {ea87e572c4a3e19f713b808b15ca093c},
intrahash = {9c55287097ead5e063b62fadcbbb4505},
keywords = {dblp},
pages = {318-329},
publisher = {CEUR-WS.org},
series = {CEUR Workshop Proceedings},
timestamp = {2024-05-20T07:17:51.000+0200},
title = {Method for identifying cyberattacks based on the use of social engineering over the phone.},
url = {http://dblp.uni-trier.de/db/conf/intelitsis/intelitsis2024.html#LysenkoBVG24},
volume = 3675,
year = 2024
}