Microsoft 11806 Published by

This paper will provide examples of poignant social engineering ‘exploitsâ€:tm: over the past few years and attempt to construct a model, using telemetry from Microsoftâ€:tm:s Windows Malicious Software Removal Tool, that can predict the prevalence of a specific social engineering threat based on its characteristics and appeal to the user.

Behavioral Modeling of Social Engineering-Based Malicious Software