All Stories

  1. Towards an Automated Recognition System for Chat-based Social Engineering Attacks in Enterprise Environments
  2. Analysis of cyber security learning and training approaches.