<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20190208//EN"
       "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.4" xml:lang="en">
 <front>
  <journal-meta>
   <journal-id journal-id-type="publisher-id">Scientific and analytical journal «Vestnik Saint-Petersburg university of State fire service of EMERCOM of Russia»</journal-id>
   <journal-title-group>
    <journal-title xml:lang="en">Scientific and analytical journal «Vestnik Saint-Petersburg university of State fire service of EMERCOM of Russia»</journal-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Научно-аналитический журнал &quot;Вестник Санкт-Петербургского университета ГПС МЧС России&quot;</trans-title>
    </trans-title-group>
   </journal-title-group>
   <issn publication-format="online">2218-130X</issn>
  </journal-meta>
  <article-meta>
   <article-id pub-id-type="publisher-id">112098</article-id>
   <article-id pub-id-type="doi">10.61260/2218-130X-2025-4-94-106</article-id>
   <article-categories>
    <subj-group subj-group-type="toc-heading" xml:lang="ru">
     <subject>ИНФОРМАТИКА, ВЫЧИСЛИТЕЛЬНАЯ ТЕХНИКА И УПРАВЛЕНИЕ</subject>
    </subj-group>
    <subj-group subj-group-type="toc-heading" xml:lang="en">
     <subject>INFORMATICS, COMPUTER ENGINEERING AND CONTROL</subject>
    </subj-group>
    <subj-group>
     <subject>ИНФОРМАТИКА, ВЫЧИСЛИТЕЛЬНАЯ ТЕХНИКА И УПРАВЛЕНИЕ</subject>
    </subj-group>
   </article-categories>
   <title-group>
    <article-title xml:lang="en">OVERVIEW OF SCIENTIFIC WORKS ON SOCIAL ENGINEERING</article-title>
    <trans-title-group xml:lang="ru">
     <trans-title>ОБЗОР НАУЧНЫХ РАБОТ ПО СОЦИАЛЬНОЙ ИНЖЕНЕРИИ</trans-title>
    </trans-title-group>
   </title-group>
   <contrib-group content-type="authors">
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Кюнер</surname>
       <given-names>Андрей Павлович</given-names>
      </name>
      <name xml:lang="en">
       <surname>Kyuner</surname>
       <given-names>Andrey P.</given-names>
      </name>
     </name-alternatives>
     <email>kunerandrey@mail.ru</email>
     <xref ref-type="aff" rid="aff-1"/>
    </contrib>
    <contrib contrib-type="author">
     <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-7056-6972</contrib-id>
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Чечулин</surname>
       <given-names>Андрей Алексеевич</given-names>
      </name>
      <name xml:lang="en">
       <surname>Chechulin</surname>
       <given-names>Andrey A.</given-names>
      </name>
     </name-alternatives>
     <email>andreych@bk.ru</email>
     <bio xml:lang="ru">
      <p>кандидат технических наук;</p>
     </bio>
     <bio xml:lang="en">
      <p>candidate of technical sciences;</p>
     </bio>
     <xref ref-type="aff" rid="aff-2"/>
    </contrib>
   </contrib-group>
   <aff-alternatives id="aff-1">
    <aff>
     <institution xml:lang="ru">Санкт-Петербургский федеральный исследовательский центр Российской академии наук</institution>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">St. Petersburg Federal Research Center of the Russian Academy of Science s</institution>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <aff-alternatives id="aff-2">
    <aff>
     <institution xml:lang="ru">Российская академия наук</institution>
     <city>Санкт-Петербург</city>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">Russian academy of sciences</institution>
     <city>Saint-Petersburg</city>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <pub-date publication-format="print" date-type="pub" iso-8601-date="2025-12-24T00:00:00+03:00">
    <day>24</day>
    <month>12</month>
    <year>2025</year>
   </pub-date>
   <pub-date publication-format="electronic" date-type="pub" iso-8601-date="2025-12-24T00:00:00+03:00">
    <day>24</day>
    <month>12</month>
    <year>2025</year>
   </pub-date>
   <volume>2025</volume>
   <issue>4</issue>
   <fpage>94</fpage>
   <lpage>106</lpage>
   <history>
    <date date-type="received" iso-8601-date="2025-09-20T00:00:00+03:00">
     <day>20</day>
     <month>09</month>
     <year>2025</year>
    </date>
    <date date-type="accepted" iso-8601-date="2025-10-31T00:00:00+03:00">
     <day>31</day>
     <month>10</month>
     <year>2025</year>
    </date>
   </history>
   <self-uri xlink:href="https://journals.igps.ru/en/nauka/article/112098/view">https://journals.igps.ru/en/nauka/article/112098/view</self-uri>
   <abstract xml:lang="ru">
    <p>Различные информационные источники акцентируют внимание на методах социальной инженерии как наиболее значимых угрозах нарушения информационной безопасности организаций и финансового сектора. Несмотря на развитие технических, организационных, законодательных и других мер защиты, угроза, исходящая от социо-инженерных атак, остается актуальной. В целях разработки методики противодействия подобным угрозам необходимо рассмотреть существующие подходы к обеспечению защиты информации от данного рода атак. В статье представлен обзор опубликованных диссертационных работ и научных статей, в которых проводилось исследование механизмов проведения атак с использованием социальной инженерии и мер противодействия. Также приводится описание основных идей по разработке новых способов защиты, области применения данных инструментов, возможностей и ограничений. В ходе анализа предлагаемых в научных работах методик защиты от социоинженерных атак представлен перечень сходства и полноты описания нарушителя информационной безопасности, каналов осуществления атак, основных этапов совершения воздействия, предлагаемых защитных мер, научной новизны.</p>
   </abstract>
   <trans-abstract xml:lang="en">
    <p>Various information resources focus on social engineering methods as the most significant threats to the information security of organizations and the financial sector. Despite the development of technical, organizational, lawmaking and other security measures, the threats caused by social engineering attacks remain relevant. This article describes an overview of published dissertations and research articles that have investigated the mechanisms of social engineering attacks and defensive mechanisms. The article also provides a description of the ideas for developing new protection methods, the scope of application of these instruments, capabilities and limitations. In the course of the analysis of the defensive methods against social engineering attacks proposed in scientific works, a list of similarities and completeness of the description of the information security violator, attack channels, the main stages of the impact, the proposed protective measures is presented, and also a scientific novelty.</p>
   </trans-abstract>
   <kwd-group xml:lang="ru">
    <kwd>социальная инженерия</kwd>
    <kwd>информационная безопасности</kwd>
    <kwd>обзор научных работ</kwd>
    <kwd>литературный анализ</kwd>
   </kwd-group>
   <kwd-group xml:lang="en">
    <kwd>social engineering</kwd>
    <kwd>information security</kwd>
    <kwd>review of scientific works</kwd>
    <kwd>literary analysis</kwd>
   </kwd-group>
  </article-meta>
 </front>
 <body>
  <p></p>
 </body>
 <back>
  <ref-list>
   <ref id="B1">
    <label>1.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Азаров А.А. Вероятностно-реляционные модели и алгоритмы обработки профиля уязвимостей пользователей при анализе защищённости персонала информационных систем от социоинженерных атак: дис. … канд. техн. наук. СПб., 2013. 232 с.</mixed-citation>
     <mixed-citation xml:lang="en">Azarov A.A. Veroyatnostno-relyacionnye modeli i algoritmy obrabotki profilya uyazvimostej pol'zovatelej pri analize zashchishchyonnosti personala informacionnyh sistem ot socioinzhenernyh atak: dis. … kand. tekhn. nauk. SPb., 2013. 232 s.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B2">
    <label>2.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Абрамов М.В. Методы и алгоритмы анализа защищённости пользователей информационных систем от социоинженерных атак: оценка параметров моделей: дис. … канд. техн. наук. СПб., 2018. 232 с.</mixed-citation>
     <mixed-citation xml:lang="en">Abramov M.V. Metody i algoritmy analiza zashchishchyonnosti pol'zovatelej informacionnyh sistem ot socioinzhenernyh atak: ocenka parametrov modelej: dis. … kand. tekhn. nauk. SPb., 2018. 232 s.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B3">
    <label>3.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Старостенко Н.И. Первоначальный этап расследования хищений, совершенных с применением методов социальной инженерии и информационно-телекоммуникационных технологий: дис. … канд. юрид. наук. Краснодар, 2023. 230 с.</mixed-citation>
     <mixed-citation xml:lang="en">Starostenko N.I. Pervonachal'nyj etap rassledovaniya hishchenij, sovershennyh s primeneniem metodov social'noj inzhenerii i informacionno-telekommunikacionnyh tekhnologij: dis. … kand. yurid. nauk. Krasnodar, 2023. 230 s.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B4">
    <label>4.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Зотина Е.В. Мошенничество с использованием информационно-телекоммуникационных технологий и приемов социальной инженерии: криминологическое исследование: дис. … канд. юрид. наук. Казань, 2024. 249 с.</mixed-citation>
     <mixed-citation xml:lang="en">Zotina E.V. Moshennichestvo s ispol'zovaniem informacionno-telekommunikacionnyh tekhnologij i priemov social'noj inzhenerii: kriminologicheskoe issledovanie: dis. … kand. yurid. nauk. Kazan', 2024. 249 s.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B5">
    <label>5.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Aldawood H.A. An Awareness Policy Framework for Cyber Security Social Engineering Threats: diss. The University of Newcastle, Australia. 2020.</mixed-citation>
     <mixed-citation xml:lang="en">Aldawood H.A. An Awareness Policy Framework for Cyber Security Social Engineering Threats: diss. The University of Newcastle, Australia. 2020.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B6">
    <label>6.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Social Engineering Defense Mechanisms and InfoSec Policies: A Survey and Qualitative Analysis. URL: https://escholarship.org/uc/item/7h783589 (дата обращения: 20.08.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Social Engineering Defense Mechanisms and InfoSec Policies: A Survey and Qualitative Analysis. URL: https://escholarship.org/uc/item/7h783589 (data obrashcheniya: 20.08.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B7">
    <label>7.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">The impact of source characteristics on users' susceptibility to social engineering Victimization in social networks. URL: https://eprints.qut.edu.au/95604/ (дата обращения: 23.08.2025).</mixed-citation>
     <mixed-citation xml:lang="en">The impact of source characteristics on users\' susceptibility to social engineering Victimization in social networks. URL: https://eprints.qut.edu.au/95604/ (data obrashcheniya: 23.08.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B8">
    <label>8.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">A user-centric framework for addressing vulnerability to social engineering in social networks: a mixed methods study of a Saudi academic community. URL: https://stax.strath.ac.uk/concern/theses/n009w2322 (дата обращения: 26.08.2025).</mixed-citation>
     <mixed-citation xml:lang="en">A user-centric framework for addressing vulnerability to social engineering in social networks: a mixed methods study of a Saudi academic community. URL: https://stax.strath.ac.uk/concern/theses/n009w2322 (data obrashcheniya: 26.08.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B9">
    <label>9.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Bullee, J-W. Enschede: Centre for Telematics and Information Technology (CTIT). URL: https://research.utwente.nl/en/publications/experimental-social-engineering-investigation-and-prevention/ (дата обращения: 26.08.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Bullee, J-W. Enschede: Centre for Telematics and Information Technology (CTIT). URL: https://research.utwente.nl/en/publications/experimental-social-engineering-investigation-and-prevention/ (data obrashcheniya: 26.08.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B10">
    <label>10.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Utilising the concept of human-as-a-security-sensor for detecting semantic social engineering attacks. URL: https://gala.gre.ac.uk/id/eprint/23420/ (дата обращения: 30.08.2025).</mixed-citation>
     <mixed-citation xml:lang="en">Utilising the concept of human-as-a-security-sensor for detecting semantic social engineering attacks. URL: https://gala.gre.ac.uk/id/eprint/23420/ (data obrashcheniya: 30.08.2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B11">
    <label>11.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Mouton F. Social engineering attack detection model: diss. University of Pretoria, South Africa. 2018.</mixed-citation>
     <mixed-citation xml:lang="en">Mouton F. Social engineering attack detection model: diss. University of Pretoria, South Africa. 2018.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B12">
    <label>12.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Kikerpill K. Crime-as-communication: detecting diagnostically useful information from the content and context of social engineering attacks. 2021.</mixed-citation>
     <mixed-citation xml:lang="en">Kikerpill K. Crime-as-communication: detecting diagnostically useful information from the content and context of social engineering attacks. 2021.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B13">
    <label>13.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Vargis J. M. Analyzing COVID-19 Era Cyber Threats on the Elderly: Toward Realizing N-Of-1 Countermeasures to Enhance Cyber Situational Awareness of Social Engineering Attacks: diss. Marymount University, 2023. DOI:10.13140/RG.2.2.25092.81289.</mixed-citation>
     <mixed-citation xml:lang="en">Vargis J. M. Analyzing COVID-19 Era Cyber Threats on the Elderly: Toward Realizing N-Of-1 Countermeasures to Enhance Cyber Situational Awareness of Social Engineering Attacks: diss. Marymount University, 2023. DOI:10.13140/RG.2.2.25092.81289.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B14">
    <label>14.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Social engineering, imperfect human / J. Neumeier [et al.] // Economic Vector. 2022. № 2 (29). P. 11–16. DOI: 10.36807/2411-7269-2022-2-29-11-16.</mixed-citation>
     <mixed-citation xml:lang="en">Social engineering, imperfect human / J. Neumeier [et al.] // Economic Vector. 2022. № 2 (29). P. 11–16. DOI: 10.36807/2411-7269-2022-2-29-11-16.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B15">
    <label>15.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Деструктивная социальная инженерия как угроза экономической безопасности: масштабы явления и меры предотвращения / Л. В. Санина [и др.] // Baikal Research Journal. 2021. Т. 12. № 2. DOI: 10.17150/2411-6262.2021.12(2).14.</mixed-citation>
     <mixed-citation xml:lang="en">Destruktivnaya social'naya inzheneriya kak ugroza ekonomicheskoj bezopasnosti: masshtaby yavleniya i mery predotvrashcheniya / L. V. Sanina [i dr.] // Baikal Research Journal. 2021. T. 12. № 2. DOI: 10.17150/2411-6262.2021.12(2).14.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B16">
    <label>16.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Журин С.И., Д.Е. Комарков Защита внешнего информационного периметра организации от целевого фишинга // Безопасность информационных технологий. 2018. Т. 25. № 4. С. 95–107.</mixed-citation>
     <mixed-citation xml:lang="en">Zhurin S.I., D.E. Komarkov Zashchita vneshnego informacionnogo perimetra organizacii ot celevogo fishinga // Bezopasnost' informacionnyh tekhnologij. 2018. T. 25. № 4. S. 95–107.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B17">
    <label>17.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Федосенко М.Ю., Менщиков А.А. Возможности применения методов социальной инженерии в организации телефонного мошенничества // Экономика и качество система связи. 2021. № 4 (22). С. 36–47.</mixed-citation>
     <mixed-citation xml:lang="en">Fedosenko M.Yu., Menshchikov A.A. Vozmozhnosti primeneniya metodov social'noj inzhenerii v organizacii telefonnogo moshennichestva // Ekonomika i kachestvo sistema svyazi. 2021. № 4 (22). S. 36–47.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B18">
    <label>18.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Наумова К.Д., Радыгин В.Ю. Исследование основных методов противодействия атакам, основанным на методах социальной инженерии, на предмет их эффективности и применимости к современной ситуации в РФ // Инновационные механизмы управления цифровой и региональной экономикой: сб. материалов V Междунар. студ. науч. конф. Москва, 2023. С. 145–158.</mixed-citation>
     <mixed-citation xml:lang="en">Naumova K.D., Radygin V.Yu. Issledovanie osnovnyh metodov protivodejstviya atakam, osnovannym na metodah social'noj inzhenerii, na predmet ih effektivnosti i primenimosti k sovremennoj situacii v RF // Innovacionnye mekhanizmy upravleniya cifrovoj i regional'noj ekonomikoj: sb. materialov V Mezhdunar. stud. nauch. konf. Moskva, 2023. S. 145–158.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B19">
    <label>19.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Исследование механизмов социальной инженерии и анализ методов противодействия / В.Ю. Евглевский [и др.] // Электронный сетевой политематический журнал «Научные труды КубГТУ». 2021. № 2. С. 57–68.</mixed-citation>
     <mixed-citation xml:lang="en">Issledovanie mekhanizmov social'noj inzhenerii i analiz metodov protivodejstviya / V.Yu. Evglevskij [i dr.] // Elektronnyj setevoj politematicheskij zhurnal «Nauchnye trudy KubGTU». 2021. № 2. S. 57–68.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B20">
    <label>20.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Воробьева И.А., Сазонов А.И. Методы социальной инженерии в контексте кибербезопасности // Colloquium-Journal. 2020. № 8-1 (60). С. 65–70.</mixed-citation>
     <mixed-citation xml:lang="en">Vorob'eva I.A., Sazonov A.I. Metody social'noj inzhenerii v kontekste kiberbezopasnosti // Colloquium-Journal. 2020. № 8-1 (60). S. 65–70.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B21">
    <label>21.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Полянская Е.П. Использование информационно-телекоммуникационных технологий в методах социальной инженерии // Криминологический журнал. 2023. № 1. С. 204–209. DOI: 10.24412/2687-0185-2023-1-204-209.</mixed-citation>
     <mixed-citation xml:lang="en">Polyanskaya E.P. Ispol'zovanie informacionno-telekommunikacionnyh tekhnologij v metodah social'noj inzhenerii // Kriminologicheskij zhurnal. 2023. № 1. S. 204–209. DOI: 10.24412/2687-0185-2023-1-204-209.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B22">
    <label>22.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Максименко Р.О., Звягинцева П.А. Типовой алгоритм воздействия в социальной инженерии // Интерэкспо Гео-Сибирь. 2019. Т. 6. № 2. С. 33–38. DOI: 10.33764/2618-981X-2019-6-2-33-38.</mixed-citation>
     <mixed-citation xml:lang="en">Maksimenko R.O., Zvyaginceva P.A. Tipovoj algoritm vozdejstviya v social'noj inzhenerii // Interekspo Geo-Sibir'. 2019. T. 6. № 2. S. 33–38. DOI: 10.33764/2618-981X-2019-6-2-33-38.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B23">
    <label>23.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Rao U. H., Nayak U. Social engineering // The InfoSec Handbook: An Introduction to Information Security. Berkeley, CA: Apress, 2014. P. 307–323. DOI: 10.1007/978-1-4302-6383-8_15.</mixed-citation>
     <mixed-citation xml:lang="en">Rao U. H., Nayak U. Social engineering // The InfoSec Handbook: An Introduction to Information Security. Berkeley, CA: Apress, 2014. P. 307–323. DOI: 10.1007/978-1-4302-6383-8_15.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B24">
    <label>24.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Advanced social engineering attacks / K. Krombholz [et al.] // Journal of Information Security and applications. 2015. Т. 22. P. 113–122. DOI: 10.1016/j.jisa.2014.09.005.</mixed-citation>
     <mixed-citation xml:lang="en">Advanced social engineering attacks / K. Krombholz [et al.] // Journal of Information Security and applications. 2015. T. 22. P. 113–122. DOI: 10.1016/j.jisa.2014.09.005.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B25">
    <label>25.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Generic taxonomy of social engineering attack and defence mechanism for handheld computer study / C.F.M. Foozy [et al.] // Malaysian Technical Universities International Conference on Engineering &amp; Technology, Batu Pahat, Johor. 2011.</mixed-citation>
     <mixed-citation xml:lang="en">Generic taxonomy of social engineering attack and defence mechanism for handheld computer study / C.F.M. Foozy [et al.] // Malaysian Technical Universities International Conference on Engineering &amp; Technology, Batu Pahat, Johor. 2011.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B26">
    <label>26.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">A comprehensive survey on social engineering-based attacks on social networks / A. Naz [et al.] // International Journal of Advanced and Applied Sciences. 2024. Т. 11. №. 4. С. 139–154. DOI: 10.21833/ijaas.2024.04.016.</mixed-citation>
     <mixed-citation xml:lang="en">A comprehensive survey on social engineering-based attacks on social networks / A. Naz [et al.] // International Journal of Advanced and Applied Sciences. 2024. T. 11. №. 4. S. 139–154. DOI: 10.21833/ijaas.2024.04.016.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B27">
    <label>27.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Salahdine F., Kaabouch N. Social engineering attacks: A survey // Future internet. 2019. Т. 11. №. 4. С. 89. DOI: 10.3390/fi11040089.</mixed-citation>
     <mixed-citation xml:lang="en">Salahdine F., Kaabouch N. Social engineering attacks: A survey // Future internet. 2019. T. 11. №. 4. S. 89. DOI: 10.3390/fi11040089.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B28">
    <label>28.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">SEAtech: Deception Techniques in Social Engineering Attacks: An Analysis of Emerging Trends and Countermeasures / D. Chapagain [et al.] // arXiv preprint arXiv:2408.02092. 2024. DOI: 10.48550/arXiv.2408.02092.</mixed-citation>
     <mixed-citation xml:lang="en">SEAtech: Deception Techniques in Social Engineering Attacks: An Analysis of Emerging Trends and Countermeasures / D. Chapagain [et al.] // arXiv preprint arXiv:2408.02092. 2024. DOI: 10.48550/arXiv.2408.02092.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B29">
    <label>29.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Alnusif M. Emerging Threats in Cybersecurity: A Comprehensive Analysis of DDoS and Social Engineering Attacks // International Journal of Engineering and Computer Science. 2025. Vol. 13, Iss. 07. P. 27473–27487. DOI: 10.18535/ijecs.v14i07.5185.</mixed-citation>
     <mixed-citation xml:lang="en">Alnusif M. Emerging Threats in Cybersecurity: A Comprehensive Analysis of DDoS and Social Engineering Attacks // International Journal of Engineering and Computer Science. 2025. Vol. 13, Iss. 07. P. 27473–27487. DOI: 10.18535/ijecs.v14i07.5185.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B30">
    <label>30.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Huseynov F., Ozdenizci Kose B. Using machine learning algorithms to predict individuals’ tendency to be victim of social engineering attacks // Information Development. 2024. Т. 40. №. 2. С. 298–318. DOI: 10.1177/02666669221116336.</mixed-citation>
     <mixed-citation xml:lang="en">Huseynov F., Ozdenizci Kose B. Using machine learning algorithms to predict individuals’ tendency to be victim of social engineering attacks // Information Development. 2024. T. 40. №. 2. S. 298–318. DOI: 10.1177/02666669221116336.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B31">
    <label>31.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Комашинский Д.В., Котенко И.В., Чечулин А.А. Категорирование веб-сайтов для блокирования веб-страниц с неприемлемым содержимым // Системы высокой доступности. 2011. Т. 7. № 2. С. 102–106.</mixed-citation>
     <mixed-citation xml:lang="en">Komashinskij D.V., Kotenko I.V., Chechulin A.A. Kategorirovanie veb-sajtov dlya blokirovaniya veb-stranic s nepriemlemym soderzhimym // Sistemy vysokoj dostupnosti. 2011. T. 7. № 2. S. 102–106.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B32">
    <label>32.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Дайнеко А.С., Кюнер А.П., Чечулин А.А. Социальная инженерия. Характеристики атакующего и схема атаки // Вестник Санкт-Петербургского государственного университета технологии и дизайна. Сер. 1: Естественные и технические науки. 2024. № 3. С. 68–74. DOI: 10.46418/2079-8199_2024_3_11.</mixed-citation>
     <mixed-citation xml:lang="en">Dajneko A.S., Kyuner A.P., Chechulin A.A. Social'naya inzheneriya. Harakteristiki atakuyushchego i skhema ataki // Vestnik Sankt-Peterburgskogo gosudarstvennogo universiteta tekhnologii i dizajna. Ser. 1: Estestvennye i tekhnicheskie nauki. 2024. № 3. S. 68–74. DOI: 10.46418/2079-8199_2024_3_11.</mixed-citation>
    </citation-alternatives>
   </ref>
  </ref-list>
 </back>
</article>
