Abstract: Detection of social engineering attacks, including phishing, pre-texting, baiting, and tailgating, is challenging. Our approach is based on machine learning techniques to identify these ...
In order to meet the rapidly increasing demand for item pools for large-scale assessments, automatic item generation (AIG) ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results