Study on wetland connectivity technology in an urban coalmine subsidence area of Huaibei, China—Engineering technology analysis

Author(s):  
F. Wang ◽  
Q.X. Zhang ◽  
R.S. Wang
2014 ◽  
Vol 989-994 ◽  
pp. 4881-4884 ◽  
Author(s):  
Gang Chen ◽  
Jun Yang ◽  
Jun Ping Cai

The social engineering techniques such as flattery, persuade, induce, disguise, threat, obedience and infiltration was summarized. The main methods and steps of social engineering research and the main six aspects contents such as social engineering technology analysis, social engineering case survey were also put forward. Finally, a model of social engineering attack based on complex network is built and some prevention methods aiming to social engineering attack were presented.


Author(s):  
Jimmy L. Mitchell ◽  
David S. Vaughan ◽  
J. Ralph Knight ◽  
Frederick H. Rueter ◽  
Jonathan Fast ◽  
...  
Keyword(s):  

2012 ◽  
Author(s):  
Nurul Na'imy Wan ◽  
Norzalina Othman ◽  
Mohd Fauzi Zainol Abidin ◽  
Mazwin Tan ◽  
Azhar Aziz

Sign in / Sign up

Export Citation Format

Share Document