{"id":"https://openalex.org/W2886020125","doi":"https://doi.org/10.1145/3230833.3233277","title":"Towards an Automated Recognition System for Chat-based Social Engineering Attacks in Enterprise Environments","display_name":"Towards an Automated Recognition System for Chat-based Social Engineering Attacks in Enterprise Environments","publication_year":2018,"publication_date":"2018-08-13","ids":{"openalex":"https://openalex.org/W2886020125","doi":"https://doi.org/10.1145/3230833.3233277","mag":"2886020125"},"language":"en","primary_location":{"id":"doi:10.1145/3230833.3233277","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3230833.3233277","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://zenodo.org/record/4010354","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066229952","display_name":"Nikolaos Tsinganos","orcid":"https://orcid.org/0000-0001-9379-1822"},"institutions":[{"id":"https://openalex.org/I192756129","display_name":"University of Macedonia","ror":"https://ror.org/05fg6gr82","country_code":"GR","type":"education","lineage":["https://openalex.org/I192756129"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Nikolaos Tsinganos","raw_affiliation_strings":["University of Macedonia, Thessaloniki, Greece"],"affiliations":[{"raw_affiliation_string":"University of Macedonia, Thessaloniki, Greece","institution_ids":["https://openalex.org/I192756129"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046660694","display_name":"Georgios Sakellariou","orcid":"https://orcid.org/0000-0003-3635-7143"},"institutions":[{"id":"https://openalex.org/I192756129","display_name":"University of Macedonia","ror":"https://ror.org/05fg6gr82","country_code":"GR","type":"education","lineage":["https://openalex.org/I192756129"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Georgios Sakellariou","raw_affiliation_strings":["University of Macedonia, Thessaloniki, Greece"],"affiliations":[{"raw_affiliation_string":"University of Macedonia, Thessaloniki, Greece","institution_ids":["https://openalex.org/I192756129"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025262737","display_name":"Panagiotis Fouliras","orcid":"https://orcid.org/0000-0002-0879-7005"},"institutions":[{"id":"https://openalex.org/I192756129","display_name":"University of Macedonia","ror":"https://ror.org/05fg6gr82","country_code":"GR","type":"education","lineage":["https://openalex.org/I192756129"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Panagiotis Fouliras","raw_affiliation_strings":["University of Macedonia, Thessaloniki, Greece"],"affiliations":[{"raw_affiliation_string":"University of Macedonia, Thessaloniki, Greece","institution_ids":["https://openalex.org/I192756129"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076485939","display_name":"Ioannis Mavridis","orcid":"https://orcid.org/0000-0001-8724-6801"},"institutions":[{"id":"https://openalex.org/I192756129","display_name":"University of Macedonia","ror":"https://ror.org/05fg6gr82","country_code":"GR","type":"education","lineage":["https://openalex.org/I192756129"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Ioannis Mavridis","raw_affiliation_strings":["University of Macedonia, Thessaloniki, Greece"],"affiliations":[{"raw_affiliation_string":"University of Macedonia, Thessaloniki, Greece","institution_ids":["https://openalex.org/I192756129"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5066229952"],"corresponding_institution_ids":["https://openalex.org/I192756129"],"apc_list":null,"apc_paid":null,"fwci":4.5228,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.95317689,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7111668586730957},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6249576210975647},{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.6097267866134644},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.5882598161697388},{"id":"https://openalex.org/keywords/social-engineering","display_name":"Social engineering (security)","score":0.5585551261901855},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4785076677799225},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.4321570098400116},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.403778076171875},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.37925535440444946},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.165788471698761}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7111668586730957},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6249576210975647},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.6097267866134644},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.5882598161697388},{"id":"https://openalex.org/C70118762","wikidata":"https://www.wikidata.org/wiki/Q376934","display_name":"Social engineering (security)","level":2,"score":0.5585551261901855},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4785076677799225},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.4321570098400116},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.403778076171875},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.37925535440444946},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.165788471698761},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3230833.3233277","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3230833.3233277","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},{"id":"pmh:oai:zenodo.org:4010354","is_oa":true,"landing_page_url":"https://zenodo.org/record/4010354","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"}],"best_oa_location":{"id":"pmh:oai:zenodo.org:4010354","is_oa":true,"landing_page_url":"https://zenodo.org/record/4010354","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"},"sustainable_development_goals":[{"score":0.5699999928474426,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G3320373336","display_name":"FORTIKA  - Cyber Security Accelerator for trusted SMEs IT Ecosystems","funder_award_id":"740690","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8051717526","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8318064016","display_name":null,"funder_award_id":"Horizon","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W265012322","https://openalex.org/W322950079","https://openalex.org/W643402404","https://openalex.org/W1487133565","https://openalex.org/W1508977358","https://openalex.org/W1511039991","https://openalex.org/W1515416463","https://openalex.org/W1545244370","https://openalex.org/W1583757370","https://openalex.org/W1996579245","https://openalex.org/W2002321422","https://openalex.org/W2003926123","https://openalex.org/W2004200997","https://openalex.org/W2028111869","https://openalex.org/W2034184249","https://openalex.org/W2037563419","https://openalex.org/W2124637344","https://openalex.org/W2153245338","https://openalex.org/W2156637201","https://openalex.org/W2164151453","https://openalex.org/W2193428859","https://openalex.org/W2278755965","https://openalex.org/W2305164035","https://openalex.org/W2358890722","https://openalex.org/W2481913442","https://openalex.org/W2533557339","https://openalex.org/W2599743206","https://openalex.org/W2620931863","https://openalex.org/W2949957935","https://openalex.org/W2973559153","https://openalex.org/W4233898666","https://openalex.org/W4243208103","https://openalex.org/W4248892918"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4377226466","https://openalex.org/W2523652134","https://openalex.org/W2081035100","https://openalex.org/W2502904752","https://openalex.org/W4230384632","https://openalex.org/W2801113695","https://openalex.org/W4246364673","https://openalex.org/W2748178716","https://openalex.org/W1604249822"],"abstract_inverted_index":{"Increase":[0],"in":[1,11,30,51,95],"usage":[2],"of":[3,23,37,40,73,82],"electronic":[4,28],"communication":[5],"tools":[6],"(email,":[7],"IM,":[8],"Skype,":[9],"etc.)":[10],"enterprise":[12],"environments":[13],"has":[14],"created":[15],"new":[16],"attack":[17,152,165,172,191],"vectors":[18],"for":[19,64,199,204],"social":[20],"engineers.":[21],"Billions":[22],"people":[24],"are":[25],"now":[26],"using":[27],"equipment":[29],"their":[31,128],"everyday":[32],"workflow":[33],"which":[34],"means":[35],"billions":[36],"potential":[38],"victims":[39,137],"Social":[41,101],"Engineering":[42],"(SE)":[43],"attacks.":[44],"Human":[45],"is":[46,58,98,103,145,209],"considered":[47],"the":[48,60,91,96,125,136,160,175,183],"weakest":[49],"link":[50],"cybersecurity":[52],"chain":[53],"and":[54,67,79,114,123,133,179,181,220],"breaking":[55],"this":[56,156],"defense":[57],"nowadays":[59],"most":[61],"accessible":[62],"route":[63],"malicious":[65],"internal":[66],"external":[68],"users.":[69],"While":[70],"several":[71],"methods":[72],"protection":[74],"have":[75],"already":[76],"been":[77],"proposed":[78],"applied,":[80],"none":[81],"these":[83],"focuses":[84],"on":[85,163,211],"chat-based":[86,205],"SE":[87,151,164,171,190,206],"attacks":[88,207],"while":[89],"at":[90],"same":[92],"time":[93],"automation":[94],"field":[97],"still":[99],"missing.":[100],"engineering":[102],"a":[104,142,149,170,189],"complex":[105],"phenomenon":[106],"that":[107,186,208],"requires":[108],"interdisciplinary":[109],"research":[110],"combining":[111],"technology,":[112],"psychology,":[113],"linguistics.":[115],"Attackers":[116],"treat":[117],"human":[118],"personality":[119],"traits":[120],"as":[121,127,138],"vulnerabilities":[122],"use":[124],"language":[126],"weapon":[129],"to":[130,147,173,192],"deceive,":[131],"persuade":[132],"finally":[134],"manipulate":[135],"they":[139],"wish.":[140],"Hence,":[141],"holistic":[143],"approach":[144,198],"required":[146],"build":[148],"reliable":[150],"recognition":[153,166,202],"system.":[154],"In":[155],"paper":[157],"we":[158,168,195],"present":[159,196],"current":[161],"state-of-the-art":[162],"systems,":[167],"dissect":[169],"recognize":[174],"different":[176],"stages,":[177],"forms,":[178],"attributes":[180],"isolate":[182],"critical":[184],"enablers":[185],"can":[187],"influence":[188],"work.":[193],"Finally,":[194],"our":[197],"an":[200],"automated":[201],"system":[203],"based":[210],"Personality":[212],"Recognition,":[213,215,217],"Influence":[214],"Deception":[216],"Speech":[218],"Act":[219],"Chat":[221],"History.":[222]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
