ISI C

55 papers

YearTitle / Authors
20172017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017
2017A framework for digital forensics analysis based on semantic role labeling.
Ravi Barreira, Vládia Pinheiro, Vasco Furtado
2017A new approach to security informatics: Actionable behavioral rules mining (ABRM).
Peng Su, Yuqin Zhao, Jian Yang, Zhenpeng Li
2017A novel approach for analysis of attack graph.
Mehdi Yousefi, Nhamo Mtetwa, Yan Zhang, Huaglory Tianfield
2017A user-centric machine learning framework for cyber security operations center.
Charles Feng, Shuning Wu, Ningwei Liu
2017Alignment-free indexing-first-one hashing with bloom filter integration.
Yen-Lung Lai, Bok-Min Goi, Tong-Yuen Chai
2017An attention-based neural popularity prediction model for social media events.
Guandan Chen, Qingchao Kong, Wenji Mao
2017An end-to-end model for Android malware detection.
Hongliang Liang, Yan Song, Da Xiao
2017An identity-based one-off public key scheme for privacy preservation.
Linpeng Chai, Bin Zhang
2017Analyzing multimodal public sentiment based on hierarchical semantic attentional network.
Nan Xu
2017Android app protection using same identifier attack defensor.
Jin-Seong Kim, Im Young Jung
2017Assessing medical device vulnerabilities on the Internet of Things.
Emma McMahon, Ryan Williams, Malaka El, Sagar Samtani, Mark W. Patton, Hsinchun Chen
2017Attack pattern mining algorithm based on security log.
Keyi Li, Yang Li, Jianyi Liu, Ru Zhang, Xi Duan
2017Behavior enhanced deep bot detection in social media.
Chiyu Cai, Linjing Li, Daniel Zeng
2017Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments.
Malaka El, Emma McMahon, Sagar Samtani, Mark W. Patton, Hsinchun Chen
2017Clustering and monitoring edge behaviour in enterprise network traffic.
Christopher Schon, Niall M. Adams, Marina Evangelou
2017Criminal intelligence surveillance and monitoring on social media: Cases of cyber-trafficking.
Wingyan Chung, Elizabeth Mustaine, Daniel Zeng
2017Developing curricular modules for cybersecurity informatics: An active learning approach.
Wingyan Chung
2017Efficient parameter selection for SVM: The case of business intelligence categorization.
Hsin-Hsiung Huang, Zijing Wang, Wingyan Chung
2017End-to-end encrypted traffic classification with one-dimensional convolution neural networks.
Wei Wang, Ming Zhu, Jinlin Wang, Xuewen Zeng, Zhongzhen Yang
2017Enhance the robustness of cyber-physical systems by adding interdependency.
Pengshuai Cui, Peidong Zhu, Peng Xun, Zhuoqun Xia
2017Exploring linguistic features for extremist texts detection (on the material of Russian-speaking illegal texts).
Dmitry Devyatkin, Ivan V. Smirnov, Ananyeva Margarita, Maria Kobozeva, Chepovskiy Andrey, Solovyev Fyodor
2017Extended abstract: Anti-DDoS technique using self-learning bloom filter.
C. Y. Tseung, Kam-Pui Chow, X. Zhang
2017Hacking social network data mining.
Yasmeen Alufaisan, Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham
2017Hierarchical network threat situation assessment method for DDoS based on D-S evidence theory.
Zihao Liu, Bin Zhang, Ning Zhu, Lixun Li
2017Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence.
John Grisham, Sagar Samtani, Mark W. Patton, Hsinchun Chen
2017Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach.
Ryan Williams, Emma McMahon, Sagar Samtani, Mark W. Patton, Hsinchun Chen
2017Impact of human mobility on police allocation.
Carlos Caminha, Vasco Furtado
2017Impact of replacement policies on static-dynamic query results cache in web search engines.
Hongyuan Ma, Ou Tao, Chunlu Zhao, Pengxiao Li, Lihong Wang
2017Information sharing & cyber threats.
Sonya H. Y. Hsu, Steven J. Dick
2017Large scale port scanning through tor using parallel Nmap scans to scan large portions of the IPv4 range.
Rodney R. Rohrmann, Vincent J. Ercolani, Mark W. Patton
2017Linking social network accounts by modeling user spatiotemporal habits.
Xiaohui Han, Lianhai Wang, Shujiang Xu, Guangqi Liu, Dawei Zhao
2017Mapping users across social media platforms by integrating text and structure information.
Song Sun, Qiudan Li, Peng Yan, Daniel Dajun Zeng
2017Modeling online collective emotions through knowledge transfer.
Saike He, Xiaolong Zheng, Daniel Zeng
2017On Man-In-The-Cloud (MITC) attacks: The analytical case of Linux.
Aaron Zimba, Zhaoshun Wang
2017Online event detection and tracking in social media based on neural similarity metric learning.
Guandan Chen, Qingchao Kong, Wenji Mao
2017Phishing detection: A recent intelligent machine learning comparison based on models content and features.
Neda Abdelhamid, Fadi A. Thabtah, Hussein Abdel-jaber
2017Prioritized active learning for malicious URL detection using weighted text-based features.
Sreyasee Das Bhattacharjee, Ashit Talukder, Ehab Al-Shaer, Pratik Doshi
2017Proactive information security behavior and individual creativity: Effects of group culture and decentralized IT governance.
Canchu Lin, Jenell L. S. Wittmer
2017Raising flags: Detecting covert storage channels using relative entropy.
Josephine K. Chow, Xiangyang Li, Xenia Mountrouidou
2017Ranking events based on user relevant query.
Xiangfei Kong, Wenji Mao
2017Real-time prediction of meme burst.
Jie Bai, Linjing Li, Lan Lu, Yanwu Yang, Daniel Zeng
2017Reasoning crypto ransomware infection vectors with Bayesian networks.
Aaron Zimba, Zhaoshun Wang, Hongsong Chen
2017Recognizing military vehicles in social media images using deep learning.
Tuomo Hiippala
2017Research on high-resolution imaging technology to extract the halftone-dot-information by iPhone.
Lu Luo, Peng Cao, Dazhong Mu
2017Research on the relationship between informatization level and global competitiveness.
Beibei Tian, Feifei Zheng, Yuqi Cao
2017Resolving reflection methods in Android applications.
Zhichao Cheng, Fanping Zeng, Xingqiu Zhong, Mingsong Zhou, Chengcheng Lv, Shuli Guo
2017Static detection of Android malware based on improved random forest algorithm.
Su Hou, Tianliang Lu, Yanhui Du, Jing Guo
2017The dynamics of health sentiments with competitive interactions in social media.
Saike He, Xiaolong Zheng, Daniel Zeng
2017The impact of different perceived support dimensions of mobile media APP users on customer commitment and customer recommendation.
Qian Li, Xiu-cun Wang
2017Tie strength still matters: Investigating interaction patterns of Al-Qaeda network in terror operations.
Ze Li, Duoyong Sun, Kun Cai, Bo Li
2017Topic and user based refinement for competitive perspective identification.
Junjie Lin, Wenji Mao, Daniel Zeng
2017Topic evolution modeling in social media short texts based on recurrent semantic dependent CRP.
Yuhao Zhang, Wenji Mao, Daniel Zeng
2017Wavelet transform and unsupervised machine learning to detect insider threat on cloud file-sharing.
Wangyan Feng, Wenfeng Yan, Shuning Wu, Ningwei Liu
2017Web-derived Emotional Word Detection in social media using Latent Semantic information.
Chiyu Cai, Linjing Li, Daniel Zeng