{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:03:33Z","timestamp":1774631013202,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3233277","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Towards an Automated Recognition System for Chat-based Social Engineering Attacks in Enterprise Environments"],"prefix":"10.1145","author":[{"given":"Nikolaos","family":"Tsinganos","sequence":"first","affiliation":[{"name":"University of Macedonia, Thessaloniki, Greece"}]},{"given":"Georgios","family":"Sakellariou","sequence":"additional","affiliation":[{"name":"University of Macedonia, Thessaloniki, Greece"}]},{"given":"Panagiotis","family":"Fouliras","sequence":"additional","affiliation":[{"name":"University of Macedonia, Thessaloniki, Greece"}]},{"given":"Ioannis","family":"Mavridis","sequence":"additional","affiliation":[{"name":"University of Macedonia, Thessaloniki, Greece"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. Information Technology - Information Security - Information Assurance | ISACA. (2018). https:\/\/www.isaca.org\/pages\/default.aspx 2018. Information Technology - Information Security - Information Assurance | ISACA. (2018). https:\/\/www.isaca.org\/pages\/default.aspx"},{"key":"e_1_3_2_1_2_1","volume-title":"Literature review for Deception detection. Dr. Diss. City Univ. New York","author":"Guozhen An.","year":"2015","unstructured":"Guozhen An. 2015. Literature review for Deception detection. Dr. Diss. City Univ. New York ( 2015 ). Guozhen An. 2015. Literature review for Deception detection. Dr. Diss. City Univ. New York (2015)."},{"key":"e_1_3_2_1_3_1","volume-title":"Information Security for South Africa (ISSA)","author":"Bezuidenhout Monique","year":"2010","unstructured":"Monique Bezuidenhout , Francois Mouton , and Hein S Venter . 2010. Social engineering attack detection model: Seadm . In Information Security for South Africa (ISSA) , 2010 . IEEE , 1--8. Monique Bezuidenhout, Francois Mouton, and Hein S Venter. 2010. Social engineering attack detection model: Seadm. In Information Security for South Africa (ISSA), 2010. IEEE, 1--8."},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. 2015 IEEE 9th Int. Conf. Semant. Comput. IEEE ICSC 2015. IEEE, 424--427","author":"Bhakta Ram","unstructured":"Ram Bhakta and Ian G. Harris . 2015. Semantic analysis of dialogs to detect social engineering attacks . In Proc. 2015 IEEE 9th Int. Conf. Semant. Comput. IEEE ICSC 2015. IEEE, 424--427 . Ram Bhakta and Ian G. Harris. 2015. Semantic analysis of dialogs to detect social engineering attacks. In Proc. 2015 IEEE 9th Int. Conf. Semant. Comput. IEEE ICSC 2015. IEEE, 424--427."},{"key":"e_1_3_2_1_5_1","volume-title":"Controlling the Human Element","author":"Cote William C.","unstructured":"William C. Cote . 1990. Controlling the Human Element . Vol. 10 . Wiley , Indianapolis, Ind . 67--75 pages. William C. Cote. 1990. Controlling the Human Element. Vol. 10. Wiley, Indianapolis, Ind. 67--75 pages."},{"key":"e_1_3_2_1_6_1","volume-title":"Towards Understanding Phishing Victims' Profile. In 2012 Int. Conf. Comput. Syst. Ind. Informatics. IEEE, 13--17","author":"Darwish Ali","year":"2012","unstructured":"Ali Darwish , Ahmed El Zarka , and Fadi Aloul . 2012 . Towards Understanding Phishing Victims' Profile. In 2012 Int. Conf. Comput. Syst. Ind. Informatics. IEEE, 13--17 . Ali Darwish, Ahmed El Zarka, and Fadi Aloul. 2012. Towards Understanding Phishing Victims' Profile. In 2012 Int. Conf. Comput. Syst. Ind. Informatics. IEEE, 13--17."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of LREC","volume":"6","author":"De Marneffe Marie-Catherine","year":"2006","unstructured":"Marie-Catherine De Marneffe , Bill MacCartney , Christopher D Manning , 2006 . Generating typed dependency parses from phrase structure parses . In Proceedings of LREC , Vol. 6 . Genoa Italy, 449--454. Marie-Catherine De Marneffe, Bill MacCartney, Christopher D Manning, et al. 2006. Generating typed dependency parses from phrase structure parses. In Proceedings of LREC, Vol. 6. Genoa Italy, 449--454."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2390665.2390708"},{"key":"e_1_3_2_1_9_1","unstructured":"David Gragg. 2003. A Multi-Level Defense Against Social Engineering Social. SANS Inst. (2003) 21. David Gragg. 2003. A Multi-Level Defense Against Social Engineering Social. SANS Inst. (2003) 21."},{"key":"e_1_3_2_1_10_1","volume-title":"Social Engineering Fundamentals, Part I: Hacker Tactics | Symantec Connect. Secur. Focus. December 1527","author":"Granger Sarah","year":"2001","unstructured":"Sarah Granger . 2001. Social Engineering Fundamentals, Part I: Hacker Tactics | Symantec Connect. Secur. Focus. December 1527 ( 2001 ). http:\/\/www.symantec.com\/connect\/articles\/social-engineering-fundamentals-part-i-hacker-tactics Sarah Granger. 2001. Social Engineering Fundamentals, Part I: Hacker Tactics | Symantec Connect. Secur. Focus. December 1527 (2001). http:\/\/www.symantec.com\/connect\/articles\/social-engineering-fundamentals-part-i-hacker-tactics"},{"key":"e_1_3_2_1_11_1","volume-title":"Str\u00f6mwall","author":"Granhag P\u00e4r Anders","year":"2004","unstructured":"P\u00e4r Anders Granhag and Leif A . Str\u00f6mwall . 2004 . The Detection of Deception in Forensic Contexts. Vol. 9780521833 . Cambridge University Press , Cambridge. 1--348 pages. arXiv:arXiv:gr-qc\/9809069v1 P\u00e4r Anders Granhag and Leif A. Str\u00f6mwall. 2004. The Detection of Deception in Forensic Contexts. Vol. 9780521833. Cambridge University Press, Cambridge. 1--348 pages. arXiv:arXiv:gr-qc\/9809069v1"},{"key":"e_1_3_2_1_12_1","unstructured":"Harl. 1997. Psychology of Social Engineering. (1997). http:\/\/barzha.cyberpunk.us\/lib\/cin\/se10.html Harl. 1997. Psychology of Social Engineering. (1997). http:\/\/barzha.cyberpunk.us\/lib\/cin\/se10.html"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2835375"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","first-page":"1833","DOI":"10.21437\/Interspeech.2005-580","article-title":"Distinguishing Deceptive from Non-Deceptive Speech","volume":"2005","author":"Hirschberg Julia","year":"2005","unstructured":"Julia Hirschberg , Stefan Benus , Jason M Brenier , Frank Enos , Sarah Friedman , Sarah Gilman , Cynthia Girand , Martin Graciarena , Andreas Kathol , Laura Michaelis , Bryan Pellom , Elizabeth Shriberg , and Andreas Stolcke . 2005 . Distinguishing Deceptive from Non-Deceptive Speech . Proc. Interspeech 2005 (2005), 1833 -- 1836 . Julia Hirschberg, Stefan Benus, Jason M Brenier, Frank Enos, Sarah Friedman, Sarah Gilman, Cynthia Girand, Martin Graciarena, Andreas Kathol, Laura Michaelis, Bryan Pellom, Elizabeth Shriberg, and Andreas Stolcke. 2005. Distinguishing Deceptive from Non-Deceptive Speech. Proc. Interspeech 2005 (2005), 1833--1836.","journal-title":"Proc. Interspeech"},{"key":"e_1_3_2_1_17_1","volume-title":"Social Engineering-Based Attacks: Model and New Sealand Perspective","author":"Janczewski Lech J","unstructured":"Lech J Janczewski and Lingyan Fu. 2010. Social Engineering-Based Attacks: Model and New Sealand Perspective . IEEE , Piscataway, NJ . Lech J Janczewski and Lingyan Fu. 2010. Social Engineering-Based Attacks: Model and New Sealand Perspective. IEEE, Piscataway, NJ."},{"key":"e_1_3_2_1_18_1","unstructured":"A Karakasiliotis S M Furnell and M Papadaki. 2006. Assessing end-user awareness of social engineering and phishing. (2006) 4--5. A Karakasiliotis S M Furnell and M Papadaki. 2006. Assessing end-user awareness of social engineering and phishing. (2006) 4--5."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.09.005"},{"key":"e_1_3_2_1_20_1","volume-title":"28th Annu. Conf. Cogn. Sci. Soc.","volume":"28","author":"Mairesse Francois","year":"2000","unstructured":"Francois Mairesse and Marilyn Walker . 2000 . Words Mark the Nerds: Computational Models of Personality Recognition through Language . In 28th Annu. Conf. Cogn. Sci. Soc. , Vol. 28 . 543--548. Francois Mairesse and Marilyn Walker. 2000. Words Mark the Nerds: Computational Models of Personality Recognition through Language. In 28th Annu. Conf. Cogn. Sci. Soc., Vol. 28. 543--548."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2017.23"},{"key":"e_1_3_2_1_22_1","unstructured":"Maranda McBride Lemuria Carter and Merrill Warkentin. 2012. Exploring the role of individual employee characteristics and personality on employee compliance with cybersecurity policies. 2011 Dewald Roode Work. Inf. Syst. Secur. Res. (2012) 1--13. Maranda McBride Lemuria Carter and Merrill Warkentin. 2012. Exploring the role of individual employee characteristics and personality on employee compliance with cybersecurity policies. 2011 Dewald Roode Work. Inf. Syst. Secur. Res. (2012) 1--13."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2015.52"},{"key":"e_1_3_2_1_25_1","first-page":"4557","article-title":"Finding Deceptive Opinion Spam by Any Stretch of the Imagination. In Proc. 49th","volume":"1107","author":"Ott Myle","year":"2011","unstructured":"Myle Ott , Yejin Choi , Claire Cardie , and Jeffrey T. Hancock . 2011 . Finding Deceptive Opinion Spam by Any Stretch of the Imagination. In Proc. 49th Annu. Meet. Assoc. Comput. Linguist. Hum. Lang. Technol. 1. Association for Computational Linguistics, 309--319. arXiv : 1107 . 4557 Myle Ott, Yejin Choi, Claire Cardie, and Jeffrey T. Hancock. 2011. Finding Deceptive Opinion Spam by Any Stretch of the Imagination. In Proc. 49th Annu. Meet. Assoc. Comput. Linguist. Hum. Lang. Technol. 1. Association for Computational Linguistics, 309--319. arXiv:1107.4557","journal-title":"Annu. Meet. Assoc. Comput. Linguist. Hum. Lang. Technol. 1. Association for Computational Linguistics, 309--319. arXiv"},{"key":"e_1_3_2_1_26_1","first-page":"5","article-title":"Social engineering: Concepts and solutions","volume":"15","author":"Peltier Thomas R.","year":"2006","unstructured":"Thomas R. Peltier . 2006 . Social engineering: Concepts and solutions . Inf. Syst. Secur. 15 , 5 (nov 2006), 13--21. Thomas R. Peltier. 2006. Social engineering: Concepts and solutions. Inf. Syst. Secur. 15, 5 (nov 2006), 13--21.","journal-title":"Inf. Syst. Secur."},{"key":"e_1_3_2_1_27_1","first-page":"305","article-title":"Influence: Science & Practice}","volume":"23","author":"Resnik Alan J.","year":"1986","unstructured":"Alan J. Resnik and Robert B. Cialdini . 1986 . Influence: Science & Practice} . Mark. Res. 23 , 3 (1986), 305 . arXiv:arXiv:1011.1669v3 Alan J. Resnik and Robert B. Cialdini. 1986. Influence: Science & Practice}. Mark. Res. 23, 3 (1986), 305. arXiv:arXiv:1011.1669v3","journal-title":"Mark. Res."},{"key":"e_1_3_2_1_28_1","volume-title":"First International Conference on Cryptology in Africa","author":"Samuel Galice Marine Serge Vaudenay","year":"2008","unstructured":"Serge Vaudenay (eds.) Samuel Galice Marine Minier (auth.). 2008 . Progress in Cryptology - AFRICACRYPT 2008 , First International Conference on Cryptology in Africa , Casablanca, Morocco , June 11-14, 2008. Proceedings (1 ed.). Lecture Notes in Computer Science 5023 Security and Cryptology, Vol. 5023. Springer-Verlag Berlin Heidelberg. Serge Vaudenay (eds.) Samuel Galice Marine Minier (auth.). 2008. Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings (1 ed.). Lecture Notes in Computer Science 5023 Security and Cryptology, Vol. 5023. Springer-Verlag Berlin Heidelberg."},{"key":"e_1_3_2_1_29_1","volume-title":"Detection of Social Engineering Attacks Through Natural Language Processing of Conversations. In 2016 IEEE Tenth Int. Conf. Semant. Comput. IEEE, 262--265","author":"Sawa Yuki","year":"2016","unstructured":"Yuki Sawa , Ram Bhakta , Ian G. Harris , and Christopher Hadnagy . 2016 . Detection of Social Engineering Attacks Through Natural Language Processing of Conversations. In 2016 IEEE Tenth Int. Conf. Semant. Comput. IEEE, 262--265 . Yuki Sawa, Ram Bhakta, Ian G. Harris, and Christopher Hadnagy. 2016. Detection of Social Engineering Attacks Through Natural Language Processing of Conversations. In 2016 IEEE Tenth Int. Conf. Semant. Comput. IEEE, 262--265."},{"key":"e_1_3_2_1_31_1","volume-title":"Schell and Clemens Martin","author":"Bernadette","year":"2006","unstructured":"Bernadette H. Schell and Clemens Martin . 2006 . Webster's New World Hacker Dictionary. Wiley Pub , Indianapolis, FN. 387 pages. Bernadette H. Schell and Clemens Martin. 2006. Webster's New World Hacker Dictionary. Wiley Pub, Indianapolis, FN. 387 pages."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"John R Searle Ferenc Kiefer Manfred Bierwisch etal 1980. Speech act theory and pragmatics. Vol. 10. Springer. John R Searle Ferenc Kiefer Manfred Bierwisch et al. 1980. Speech act theory and pragmatics. Vol. 10. Springer.","DOI":"10.1007\/978-94-009-8964-1"},{"key":"e_1_3_2_1_33_1","volume-title":"Encyclopedia of applied psychology","author":"Spielberger Charles Donald","unstructured":"Charles Donald Spielberger . 2004. Encyclopedia of applied psychology . Elsevier Academic Press . Charles Donald Spielberger. 2004. Encyclopedia of applied psychology. Elsevier Academic Press."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2013.763860"},{"key":"e_1_3_2_1_35_1","volume-title":"Tobergte and Shirley Curtis","author":"David","year":"2013","unstructured":"David R. Tobergte and Shirley Curtis . 2013 . INFLUENCE The Psychology of Persuasion. Vol. 53 . Harper Collins . 1689--1699 pages. arXiv:arXiv:1011.1669v3 David R. Tobergte and Shirley Curtis. 2013. INFLUENCE The Psychology of Persuasion. Vol. 53. Harper Collins. 1689--1699 pages. arXiv:arXiv:1011.1669v3"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/STAST.2014.12"},{"key":"e_1_3_2_1_37_1","volume-title":"2015 Data Breach Investigations Report. Verizon Bus. J. 1 (may","year":"2015","unstructured":"Verizon. 2015. 2015 Data Breach Investigations Report. Verizon Bus. J. 1 (may 2015 ), 1--70. arXiv:arXiv:1011.1669v3 Verizon. 2015. 2015 Data Breach Investigations Report. Verizon Bus. J. 1 (may 2015), 1--70. arXiv:arXiv:1011.1669v3"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Aldert Vrij. 2014. Detecting lies and deceit: Pitfalls and opportunities in nonverbal and verbal lie detection. In Interpers. Commun. 321--346. Aldert Vrij. 2014. Detecting lies and deceit: Pitfalls and opportunities in nonverbal and verbal lie detection. In Interpers. Commun. 321--346.","DOI":"10.1515\/9783110276794.321"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/637069.637096"},{"key":"e_1_3_2_1_40_1","volume-title":"C","author":"Zuckerman Miron","year":"1981","unstructured":"Miron Zuckerman , Bella M. Depaulo , and Robert Rosenthal . 1981. Verbal and nonverbal communication of deception. Adv. Exp. Soc. Psychol. 14 , C ( 1981 ), 1--59. arXiv:2066187 Miron Zuckerman, Bella M. Depaulo, and Robert Rosenthal. 1981. Verbal and nonverbal communication of deception. Adv. Exp. Soc. Psychol. 14, C (1981), 1--59. arXiv:2066187"}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","location":"Hamburg Germany","acronym":"ARES 2018","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"]},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3233277","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3233277","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:51Z","timestamp":1750212471000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3233277"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":36,"alternative-id":["10.1145\/3230833.3233277","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3233277","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}