YoVDO

Exposing Influence in Cyber Social Engineering - Thinking Slow

Offered By: USENIX Enigma Conference via YouTube

Tags

Cybersecurity Courses Machine Learning Courses Social Engineering Courses Text Analysis Courses

Course Description

Overview

Explore a conference talk that delves into the use of influence tactics in cyber social engineering and human-targeted deception. Examine how machine learning methods can expose influence cues in texts to prevent online deception. Learn about the Lumen framework and Potentiam dataset, which were developed to study influence in various types of online content. Discover the potential of ML in improving human-based detection of deceptive material and reducing vulnerability to online manipulation.

Syllabus

Intro
Phishing
Influence cues
Data
Coding
Results
Big Picture


Taught by

USENIX Enigma Conference

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network