| 2016 | A non-parametric learning approach to identify online human trafficking. Hamidreza Alvari, Paulo Shakarian, J. E. Kelly Snyder |
| 2016 | AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis. Sagar Samtani, Kory Chinn, Cathy Larson, Hsinchun Chen |
| 2016 | Activating topic models from a cognitive perspective. Jie Bai, Linjing Li, Daniel Zeng |
| 2016 | Activity monitoring using topic models. Boshra Nabaei, Martin Ester |
| 2016 | Activity-based temporal anomaly detection in enterprise-cyber security. Mark Whitehouse, Marina Evangelou, Niall M. Adams |
| 2016 | An immune inspired unsupervised intrusion detection system for detection of novel attacks. Manjari Jha, Raj Acharya |
| 2016 | An undergraduate Cyber Operations curriculum in the making: A 10 Shiva Azadegan, Michael O'Leary |
| 2016 | Anonymous port scanning: Performing network reconnaissance through Tor. Rodney Rohrmann, Mark W. Patton, Hsinchun Chen |
| 2016 | Approaches to understanding the motivations behind cyber attacks. Sumeet Kumar, Kathleen M. Carley |
| 2016 | Automated big text security classification. Khudran Alzhrani, Ethan M. Rudd, Terrance E. Boult, C. Edward Chow |
| 2016 | Automatic clustering of malware variants. Rima Asmar Awad, Kirk D. Sayre |
| 2016 | Automatic detection of xenophobic narratives: A case study on Swedish alternative media. Lisa Kaati, Amendra Shrestha, Katie Cohen, Sinna Lindquist |
| 2016 | Bayesian nonparametric relational learning with the broken tree process. Justin Sahs |
| 2016 | Challenges, lessons learned and results from establishing a CyberCorps: Scholarship for Service program targeting undergraduate students. Shiva Azadegan, Josh Dehlinger, Siddharth Kaza, Blair Taylor, Wei Yu |
| 2016 | Chinese underground market jargon analysis based on unsupervised learning. Kangzhi Zhao, Yong Zhang, Chunxiao Xing, Weifeng Li, Hsinchun Chen |
| 2016 | Competitive perspective identification via topic based refinement for online documents. Junjie Lin, Wenji Mao, Daniel Zeng |
| 2016 | CySCom: Cybersecurity COMics. Brian Ledbetter, Zach Wallace, Adam Harms, Ambareen Siraj, Laurin Buchanan |
| 2016 | Cybersecurity workforce development: A peer mentoring approach. Vandana P. Janeja, Carolyn B. Seaman, Kerrie Kephart, Aryya Gangopadhyay, Amy Everhart |
| 2016 | DDoS cyber-attacks network: Who's attacking whom. Sumeet Kumar, Kathleen M. Carley |
| 2016 | Darknet and deepnet mining for proactive cybersecurity threat intelligence. Eric Nunes, Ahmad Diab, Andrew T. Gunn, Ericsson Marin, Vineet Mishra, Vivin Paliath, John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian |
| 2016 | Design and implementation of a multi-facet hierarchical cybersecurity education framework. Wei Wei, Arti Mann, Kewei Sha, T. Andrew Yang |
| 2016 | Detecting radicalization trajectories using graph pattern matching algorithms. Benjamin W. K. Hung, Anura P. Jayasumana, Vidarshana W. Bandara |
| 2016 | Disassortativity of computer networks. Patrick Rubin-Delanchy, Niall M. Adams, Nicholas A. Heard |
| 2016 | Discovering structure in Islamist postings using systemic nets. Nasser Alsadhan, David B. Skillicorn |
| 2016 | Effective prioritization of network intrusion alerts to enhance situational awareness. E. Allison Newcomb, Robert J. Hammell, Steve E. Hutchinson |
| 2016 | Engaging females in cybersecurity: K through Gray. Xiang Michelle Liu, Diane R. Murphy |
| 2016 | Exploring key hackers and cybersecurity threats in Chinese hacker communities. Zhen Fang, Xinyi Zhao, Qiang Wei, Guoqing Chen, Yong Zhang, Chunxiao Xing, Weifeng Li, Hsinchun Chen |
| 2016 | Exploring the online underground marketplaces through topic-based social network and clustering. Shin-Ying Huang, Hsinchun Chen |
| 2016 | IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016 |
| 2016 | Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques. Sagar Samtani, Shuo Yu, Hongyi Zhu, Mark W. Patton, Hsinchun Chen |
| 2016 | Identifying devices across the IPv4 address space. Ryan Jicha, Mark W. Patton, Hsinchun Chen |
| 2016 | Identifying features for detecting fraudulent loan requests on P2P platforms. Jennifer Jie Xu, Dongyu Chen, Michael Chau |
| 2016 | Identifying language groups within multilingual cybercriminal forums. Victor A. Benjamin, Hsinchun Chen |
| 2016 | Identifying the socio-spatial dynamics of terrorist attacks in the Middle East. Ze Li, Duoyong Sun, Hsinchun Chen, Shin-Ying Huang |
| 2016 | Identifying top listers in Alphabay using Latent Dirichlet Allocation. John Grisham, Calvin Barreras, Cyran Afarin, Mark W. Patton, Hsinchun Chen |
| 2016 | Intruder detector: A continuous authentication tool to model user behavior. Leslie C. Milton, Atif Memon |
| 2016 | IoT Security Development Framework for building trustworthy Smart car services. Jesus Pacheco, Shalaka Satam, Salim Hariri, Clarisa Grijalva, Helena Berkenbrock |
| 2016 | Measuring online affects in a white supremacy forum. Leo Figea, Lisa Kaati, Ryan Scrivens |
| 2016 | Meme extraction and tracing in crisis events. Saike He, Xiaolong Zheng, Jiaojiao Wang, Zhijun Chang, Yin Luo, Daniel Zeng |
| 2016 | Mining hospital data breach records: Cyber threats to U.S. hospitals. Travis Floyd, Matthew Grieco, Edna F. Reid |
| 2016 | Model-based clustering and new edge modelling in large computer networks. Silvia Metelli, Nicholas A. Heard |
| 2016 | Modeling cyber-attacks on industrial control systems. Vivin Paliath, Paulo Shakarian |
| 2016 | Near real-time atrocity event coding. Mohiuddin Solaimani, Sayeed Salam, Ahmad M. Mustafa, Latifur Khan, Patrick T. Brandt, Bhavani Thuraisingham |
| 2016 | Network-wide anomaly detection via the Dirichlet process. Nick Heard, Patrick Rubin-Delanchy |
| 2016 | New words enlightened sentiment analysis in social media. Chiyu Cai, Linjing Li, Daniel Zeng |
| 2016 | Parallel Massive Data Monitoring and Processing Using Sensor Networks. Hamid Reza Naji, Najmeh Rezaee |
| 2016 | PhishMonger: A free and open source public archive of real-world phishing websites. David G. Dobolyi, Ahmed Abbasi |
| 2016 | Phishing susceptibility: The good, the bad, and the ugly. Ahmed Abbasi, F. Mariam Zahedi, Yan Chen |
| 2016 | Poisson factorization for peer-based anomaly detection. Melissa J. Turcotte, Juston S. Moore, Nick Heard, Aaron McPhall |
| 2016 | Predictability of NetFlow data. Marina Evangelou, Niall M. Adams |
| 2016 | Product offerings in malicious hacker markets. Ericsson Marin, Ahmad Diab, Paulo Shakarian |
| 2016 | Rights management to enable a true Internet of Things. Robert Newman, Pat Doody, Mira Trebar, Uchenna Okoke |
| 2016 | SCADA honeypots: An in-depth analysis of Conpot. Arthur Jicha, Mark W. Patton, Hsinchun Chen |
| 2016 | Shodan visualized. Vincent J. Ercolani, Mark W. Patton, Hsinchun Chen |
| 2016 | Smart augmented reality glasses in cybersecurity and forensic education. Nikitha Kommera, Faisal Kaleem, Syed Mubashir Shah Harooni |
| 2016 | Social Media account linkage using user-generated geo-location data. Xiaohui Han, Lianhai Wang, Lijuan Xu, Shuihui Zhang |
| 2016 | Social role clustering with topic model. Jie Bai, Linjing Li, Daniel Zeng, Junjie Lin |
| 2016 | Soft Computing and Hybrid Intelligence for Decision Support in Forensics Science. Andrii Shalaginov |
| 2016 | Spatial-temporal patterns and drivers of illicit tobacco trade in Changsha county, China. Jiaojiao Wang, Saike He, Yiyuan Xu, Zhidong Cao, Lei Wang, Daniel Dajun Zeng |
| 2016 | Surfacing collaborated networks in dark web to find illicit and criminal content. Ahmed T. Zulkarnine, Richard Frank, Bryan Monk, Julianna Mitchell, Garth Davies |
| 2016 | Targeting key data breach services in underground supply chain. Weifeng Li, Junming Yin, Hsinchun Chen |
| 2016 | The impact of US cyber policies on cyber-attacks trend. Sumeet Kumar, Matthew Benigni, Kathleen M. Carley |
| 2016 | Topic modeling of small sequential documents: Proposed experiments for detecting terror attacks. Brandon W. Jones, Wingyan Chung |
| 2016 | Topic modelling of authentication events in an enterprise computer network. Nick Heard, Konstantina Palla, Maria Skoularidou |
| 2016 | Trust and distrust as distinct constructs: Evidence from data theft environments. Steven John Simon |
| 2016 | Understanding DDoS cyber-attacks using social media analytics. Sumeet Kumar, Kathleen M. Carley |
| 2016 | Using cyber defense exercises to obtain additional data for attacker profiling. Joel Brynielsson, Ulrik Franke, Muhammad Adnan Tariq, Stefan Varga |
| 2016 | Using eye-tracking to investigate content skipping: A study on learning modules in cybersecurity. Sagar Raina, Leon Bernard, Blair Taylor, Siddharth Kaza |
| 2016 | Using social network analysis to identify key hackers for keylogging tools in hacker forums. Sagar Samtani, Hsinchun Chen |