ISI C

69 papers

YearTitle / Authors
2016A non-parametric learning approach to identify online human trafficking.
Hamidreza Alvari, Paulo Shakarian, J. E. Kelly Snyder
2016AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis.
Sagar Samtani, Kory Chinn, Cathy Larson, Hsinchun Chen
2016Activating topic models from a cognitive perspective.
Jie Bai, Linjing Li, Daniel Zeng
2016Activity monitoring using topic models.
Boshra Nabaei, Martin Ester
2016Activity-based temporal anomaly detection in enterprise-cyber security.
Mark Whitehouse, Marina Evangelou, Niall M. Adams
2016An immune inspired unsupervised intrusion detection system for detection of novel attacks.
Manjari Jha, Raj Acharya
2016An undergraduate Cyber Operations curriculum in the making: A 10
Shiva Azadegan, Michael O'Leary
2016Anonymous port scanning: Performing network reconnaissance through Tor.
Rodney Rohrmann, Mark W. Patton, Hsinchun Chen
2016Approaches to understanding the motivations behind cyber attacks.
Sumeet Kumar, Kathleen M. Carley
2016Automated big text security classification.
Khudran Alzhrani, Ethan M. Rudd, Terrance E. Boult, C. Edward Chow
2016Automatic clustering of malware variants.
Rima Asmar Awad, Kirk D. Sayre
2016Automatic detection of xenophobic narratives: A case study on Swedish alternative media.
Lisa Kaati, Amendra Shrestha, Katie Cohen, Sinna Lindquist
2016Bayesian nonparametric relational learning with the broken tree process.
Justin Sahs
2016Challenges, lessons learned and results from establishing a CyberCorps: Scholarship for Service program targeting undergraduate students.
Shiva Azadegan, Josh Dehlinger, Siddharth Kaza, Blair Taylor, Wei Yu
2016Chinese underground market jargon analysis based on unsupervised learning.
Kangzhi Zhao, Yong Zhang, Chunxiao Xing, Weifeng Li, Hsinchun Chen
2016Competitive perspective identification via topic based refinement for online documents.
Junjie Lin, Wenji Mao, Daniel Zeng
2016CySCom: Cybersecurity COMics.
Brian Ledbetter, Zach Wallace, Adam Harms, Ambareen Siraj, Laurin Buchanan
2016Cybersecurity workforce development: A peer mentoring approach.
Vandana P. Janeja, Carolyn B. Seaman, Kerrie Kephart, Aryya Gangopadhyay, Amy Everhart
2016DDoS cyber-attacks network: Who's attacking whom.
Sumeet Kumar, Kathleen M. Carley
2016Darknet and deepnet mining for proactive cybersecurity threat intelligence.
Eric Nunes, Ahmad Diab, Andrew T. Gunn, Ericsson Marin, Vineet Mishra, Vivin Paliath, John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian
2016Design and implementation of a multi-facet hierarchical cybersecurity education framework.
Wei Wei, Arti Mann, Kewei Sha, T. Andrew Yang
2016Detecting radicalization trajectories using graph pattern matching algorithms.
Benjamin W. K. Hung, Anura P. Jayasumana, Vidarshana W. Bandara
2016Disassortativity of computer networks.
Patrick Rubin-Delanchy, Niall M. Adams, Nicholas A. Heard
2016Discovering structure in Islamist postings using systemic nets.
Nasser Alsadhan, David B. Skillicorn
2016Effective prioritization of network intrusion alerts to enhance situational awareness.
E. Allison Newcomb, Robert J. Hammell, Steve E. Hutchinson
2016Engaging females in cybersecurity: K through Gray.
Xiang Michelle Liu, Diane R. Murphy
2016Exploring key hackers and cybersecurity threats in Chinese hacker communities.
Zhen Fang, Xinyi Zhao, Qiang Wei, Guoqing Chen, Yong Zhang, Chunxiao Xing, Weifeng Li, Hsinchun Chen
2016Exploring the online underground marketplaces through topic-based social network and clustering.
Shin-Ying Huang, Hsinchun Chen
2016IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016
2016Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques.
Sagar Samtani, Shuo Yu, Hongyi Zhu, Mark W. Patton, Hsinchun Chen
2016Identifying devices across the IPv4 address space.
Ryan Jicha, Mark W. Patton, Hsinchun Chen
2016Identifying features for detecting fraudulent loan requests on P2P platforms.
Jennifer Jie Xu, Dongyu Chen, Michael Chau
2016Identifying language groups within multilingual cybercriminal forums.
Victor A. Benjamin, Hsinchun Chen
2016Identifying the socio-spatial dynamics of terrorist attacks in the Middle East.
Ze Li, Duoyong Sun, Hsinchun Chen, Shin-Ying Huang
2016Identifying top listers in Alphabay using Latent Dirichlet Allocation.
John Grisham, Calvin Barreras, Cyran Afarin, Mark W. Patton, Hsinchun Chen
2016Intruder detector: A continuous authentication tool to model user behavior.
Leslie C. Milton, Atif Memon
2016IoT Security Development Framework for building trustworthy Smart car services.
Jesus Pacheco, Shalaka Satam, Salim Hariri, Clarisa Grijalva, Helena Berkenbrock
2016Measuring online affects in a white supremacy forum.
Leo Figea, Lisa Kaati, Ryan Scrivens
2016Meme extraction and tracing in crisis events.
Saike He, Xiaolong Zheng, Jiaojiao Wang, Zhijun Chang, Yin Luo, Daniel Zeng
2016Mining hospital data breach records: Cyber threats to U.S. hospitals.
Travis Floyd, Matthew Grieco, Edna F. Reid
2016Model-based clustering and new edge modelling in large computer networks.
Silvia Metelli, Nicholas A. Heard
2016Modeling cyber-attacks on industrial control systems.
Vivin Paliath, Paulo Shakarian
2016Near real-time atrocity event coding.
Mohiuddin Solaimani, Sayeed Salam, Ahmad M. Mustafa, Latifur Khan, Patrick T. Brandt, Bhavani Thuraisingham
2016Network-wide anomaly detection via the Dirichlet process.
Nick Heard, Patrick Rubin-Delanchy
2016New words enlightened sentiment analysis in social media.
Chiyu Cai, Linjing Li, Daniel Zeng
2016Parallel Massive Data Monitoring and Processing Using Sensor Networks.
Hamid Reza Naji, Najmeh Rezaee
2016PhishMonger: A free and open source public archive of real-world phishing websites.
David G. Dobolyi, Ahmed Abbasi
2016Phishing susceptibility: The good, the bad, and the ugly.
Ahmed Abbasi, F. Mariam Zahedi, Yan Chen
2016Poisson factorization for peer-based anomaly detection.
Melissa J. Turcotte, Juston S. Moore, Nick Heard, Aaron McPhall
2016Predictability of NetFlow data.
Marina Evangelou, Niall M. Adams
2016Product offerings in malicious hacker markets.
Ericsson Marin, Ahmad Diab, Paulo Shakarian
2016Rights management to enable a true Internet of Things.
Robert Newman, Pat Doody, Mira Trebar, Uchenna Okoke
2016SCADA honeypots: An in-depth analysis of Conpot.
Arthur Jicha, Mark W. Patton, Hsinchun Chen
2016Shodan visualized.
Vincent J. Ercolani, Mark W. Patton, Hsinchun Chen
2016Smart augmented reality glasses in cybersecurity and forensic education.
Nikitha Kommera, Faisal Kaleem, Syed Mubashir Shah Harooni
2016Social Media account linkage using user-generated geo-location data.
Xiaohui Han, Lianhai Wang, Lijuan Xu, Shuihui Zhang
2016Social role clustering with topic model.
Jie Bai, Linjing Li, Daniel Zeng, Junjie Lin
2016Soft Computing and Hybrid Intelligence for Decision Support in Forensics Science.
Andrii Shalaginov
2016Spatial-temporal patterns and drivers of illicit tobacco trade in Changsha county, China.
Jiaojiao Wang, Saike He, Yiyuan Xu, Zhidong Cao, Lei Wang, Daniel Dajun Zeng
2016Surfacing collaborated networks in dark web to find illicit and criminal content.
Ahmed T. Zulkarnine, Richard Frank, Bryan Monk, Julianna Mitchell, Garth Davies
2016Targeting key data breach services in underground supply chain.
Weifeng Li, Junming Yin, Hsinchun Chen
2016The impact of US cyber policies on cyber-attacks trend.
Sumeet Kumar, Matthew Benigni, Kathleen M. Carley
2016Topic modeling of small sequential documents: Proposed experiments for detecting terror attacks.
Brandon W. Jones, Wingyan Chung
2016Topic modelling of authentication events in an enterprise computer network.
Nick Heard, Konstantina Palla, Maria Skoularidou
2016Trust and distrust as distinct constructs: Evidence from data theft environments.
Steven John Simon
2016Understanding DDoS cyber-attacks using social media analytics.
Sumeet Kumar, Kathleen M. Carley
2016Using cyber defense exercises to obtain additional data for attacker profiling.
Joel Brynielsson, Ulrik Franke, Muhammad Adnan Tariq, Stefan Varga
2016Using eye-tracking to investigate content skipping: A study on learning modules in cybersecurity.
Sagar Raina, Leon Bernard, Blair Taylor, Siddharth Kaza
2016Using social network analysis to identify key hackers for keylogging tools in hacker forums.
Sagar Samtani, Hsinchun Chen