Credit Risk Analysis using Explainable Artificial Intelligence
Volume-6 | Issue-3

Fuel Sales Forecasting with SARIMA-GARCH and Rolling Window
Volume-5 | Issue-3

A Comprehensive Review on Advanced Driver Assistance System
Volume-4 | Issue-2

An Accurate Bitcoin Price Prediction using logistic regression with LSTM Machine Learning model
Volume-3 | Issue-3

Multi-UAV Path Planning using Grey Wolf Optimization and RRT Algorithm
Volume-7 | Issue-2

Implications of Tokenizers in BERT Model for Low-Resource Indian Language
Volume-4 | Issue-4

Performance Evaluation and Comparison using Deep Learning Techniques in Sentiment Analysis
Volume-3 | Issue-2

Robotic Surgery with Computer Vision: A Case Study on Da Vinci Systems
Volume-7 | Issue-3

Literature Review on Detection Systems for Wild Animal Intrusions
Volume-5 | Issue-1

Wind Compensation in Drones using PID Control Enhanced by Extended Kalman Filtering
Volume-7 | Issue-3

An Integrated Approach for Crop Production Analysis from Geographic Information System Data using SqueezeNet
Volume-3 | Issue-4

An Accurate Bitcoin Price Prediction using logistic regression with LSTM Machine Learning model
Volume-3 | Issue-3

Design of Distribution Transformer Health Management System using IoT Sensors
Volume-3 | Issue-3

Design of a Food Recommendation System using ADNet algorithm on a Hybrid Data Mining Process
Volume-3 | Issue-4

Automatic Diagnosis of Alzheimer’s disease using Hybrid Model and CNN
Volume-3 | Issue-4

Effective Prediction of Online Reviews for Improvement of Customer Recommendation Services by Hybrid Classification Approach
Volume-3 | Issue-4

Acoustic Features Based Emotional Speech Signal Categorization by Advanced Linear Discriminator Analysis
Volume-3 | Issue-4

PAPR Analysis of OFDM using Selective Mapping Method
Volume-4 | Issue-3

Analysis of Statistical Trends of Future Air Pollutants for Accurate Prediction
Volume-3 | Issue-4

Identification of Electricity Threat and Performance Analysis using LSTM and RUSBoost Methodology
Volume-3 | Issue-4

Home / Archives / Volume-5 / Issue-3 / Article-2

An In-Depth Evaluation of Hybrid Approaches in Soft Computing for the Identification of Social Engineering

Rahul Kumar Jha 
Open Access
Volume - 5 • Issue - 3 • september 2023
232-248  191 PDF
Abstract

Social engineering attacks continue to pose significant threats to information security by exploiting human psychology and manipulating individuals into divulging sensitive information or performing actions that compromise organizational systems. Traditional defense mechanisms often struggle to detect and mitigate such attacks due to their dynamic and deceptive nature. In response, the integration of hybrid soft computing techniques has developed as a promising method to enhance the accuracy and effectiveness of social engineering detection systems. This study provides an in-depth exploration of the various hybrid soft computing methodologies applied to the detection of social engineering attacks. It discusses the synergistic combination of different soft computing techniques, such as genetic algorithms, neural networks, swarm intelligence and fuzzy logic along with their integration with other security measures. The study presents a comprehensive survey of recent research advancements, methodologies, datasets, performance metrics, and challenges in the domain of hybrid soft computing for social engineering detection. Furthermore, it offers insights into potential future directions and applications for advancing the field.

Cite this article
Jha, Rahul Kumar. "An In-Depth Evaluation of Hybrid Approaches in Soft Computing for the Identification of Social Engineering." Journal of Soft Computing Paradigm 5, no. 3 (2023): 232-248. doi: 10.36548/jscp.2023.3.002
Copy Citation
Jha, R. K. (2023). An In-Depth Evaluation of Hybrid Approaches in Soft Computing for the Identification of Social Engineering. Journal of Soft Computing Paradigm, 5(3), 232-248. https://doi.org/10.36548/jscp.2023.3.002
Copy Citation
Jha, Rahul Kumar "An In-Depth Evaluation of Hybrid Approaches in Soft Computing for the Identification of Social Engineering." Journal of Soft Computing Paradigm, vol. 5, no. 3, 2023, pp. 232-248. DOI: 10.36548/jscp.2023.3.002.
Copy Citation
Jha RK. An In-Depth Evaluation of Hybrid Approaches in Soft Computing for the Identification of Social Engineering. Journal of Soft Computing Paradigm. 2023;5(3):232-248. doi: 10.36548/jscp.2023.3.002
Copy Citation
R. K. Jha, "An In-Depth Evaluation of Hybrid Approaches in Soft Computing for the Identification of Social Engineering," Journal of Soft Computing Paradigm, vol. 5, no. 3, pp. 232-248, Sep. 2023, doi: 10.36548/jscp.2023.3.002.
Copy Citation
Jha, R.K. (2023) 'An In-Depth Evaluation of Hybrid Approaches in Soft Computing for the Identification of Social Engineering', Journal of Soft Computing Paradigm, vol. 5, no. 3, pp. 232-248. Available at: https://doi.org/10.36548/jscp.2023.3.002.
Copy Citation
@article{jha2023,
  author    = {Rahul Kumar Jha},
  title     = {{An In-Depth Evaluation of Hybrid Approaches in Soft Computing for the Identification of Social Engineering}},
  journal   = {Journal of Soft Computing Paradigm},
  volume    = {5},
  number    = {3},
  pages     = {232-248},
  year      = {2023},
  publisher = {IRO Journals},
  doi       = {10.36548/jscp.2023.3.002},
  url       = {https://doi.org/10.36548/jscp.2023.3.002}
}
Copy Citation
Keywords
Social Engineering Soft Computing Hybrid Techniques Neural Networks Fuzzy Logic Genetic Algorithms Swarm Intelligence Detection Information Security
Published
21 August, 2023
×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
15 USD
Open Access Fee Nil
Annual Subscription Fee
200 USD
After payment,
please send an email to irojournals.contact@gmail.com / journals@iroglobal.com requesting article access.
Subscription form: click here