Modelling of the social engineering attacks based on social graph of employees communications analysis

  title={Modelling of the social engineering attacks based on social graph of employees communications analysis},
  author={A. Suleimanov and M. Abramov and A. Tulupyev},
  journal={2018 IEEE Industrial Cyber-Physical Systems (ICPS)},
  • A. Suleimanov, M. Abramov, A. Tulupyev
  • Published 2018
  • Computer Science
  • 2018 IEEE Industrial Cyber-Physical Systems (ICPS)
  • The article is aimed at solving the problem of constructing and analyzing a compressed social graph, taking into account the estimates of the probability of a transition of the intruder's influence from user to user. The subject of the study are user accounts in the social network VKontakte as the basis for building user interaction and social graphs on them. Due to the peculiarities of the graphs under consideration, processing them is a very time-consuming task, requiring large computational… CONTINUE READING
    9 Citations
    Algebraic Bayesian Networks: Empirical Estimates of the Sensitivity of Local Posteriori Inference
    Algebraic Bayesian Networks: the Complexity of Consistency Checking


    Approaches to development of models for text analysis of information in social network profiles in order to evaluate user's vulnerabilities profile
    • 6
    • Highly Influential
    Community-Structured Evolutionary Game for Privacy Protection in Social Networks
    • 32
    • PDF
    Hybridization of computational intelligence methods for attack detection in computer networks
    • 19
    • PDF
    Parallel Processing of Big Heterogeneous Data for Security Monitoring of IoT Networks
    • 9
    Modeling and analysis of security incidents for mobile communication mesh Zigbee-based network
    • V. Desnitsky, I. Kotenko
    • Computer Science
    • 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM)
    • 2017
    • 3
    Fighting against phishing attacks: state of the art and future challenges
    • 97
    Generation of Source Data for Experiments with Network Attack Detection Software
    • 5