| 2017 | 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017 |
| 2017 | A framework for digital forensics analysis based on semantic role labeling. Ravi Barreira, Vládia Pinheiro, Vasco Furtado |
| 2017 | A new approach to security informatics: Actionable behavioral rules mining (ABRM). Peng Su, Yuqin Zhao, Jian Yang, Zhenpeng Li |
| 2017 | A novel approach for analysis of attack graph. Mehdi Yousefi, Nhamo Mtetwa, Yan Zhang, Huaglory Tianfield |
| 2017 | A user-centric machine learning framework for cyber security operations center. Charles Feng, Shuning Wu, Ningwei Liu |
| 2017 | Alignment-free indexing-first-one hashing with bloom filter integration. Yen-Lung Lai, Bok-Min Goi, Tong-Yuen Chai |
| 2017 | An attention-based neural popularity prediction model for social media events. Guandan Chen, Qingchao Kong, Wenji Mao |
| 2017 | An end-to-end model for Android malware detection. Hongliang Liang, Yan Song, Da Xiao |
| 2017 | An identity-based one-off public key scheme for privacy preservation. Linpeng Chai, Bin Zhang |
| 2017 | Analyzing multimodal public sentiment based on hierarchical semantic attentional network. Nan Xu |
| 2017 | Android app protection using same identifier attack defensor. Jin-Seong Kim, Im Young Jung |
| 2017 | Assessing medical device vulnerabilities on the Internet of Things. Emma McMahon, Ryan Williams, Malaka El, Sagar Samtani, Mark W. Patton, Hsinchun Chen |
| 2017 | Attack pattern mining algorithm based on security log. Keyi Li, Yang Li, Jianyi Liu, Ru Zhang, Xi Duan |
| 2017 | Behavior enhanced deep bot detection in social media. Chiyu Cai, Linjing Li, Daniel Zeng |
| 2017 | Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments. Malaka El, Emma McMahon, Sagar Samtani, Mark W. Patton, Hsinchun Chen |
| 2017 | Clustering and monitoring edge behaviour in enterprise network traffic. Christopher Schon, Niall M. Adams, Marina Evangelou |
| 2017 | Criminal intelligence surveillance and monitoring on social media: Cases of cyber-trafficking. Wingyan Chung, Elizabeth Mustaine, Daniel Zeng |
| 2017 | Developing curricular modules for cybersecurity informatics: An active learning approach. Wingyan Chung |
| 2017 | Efficient parameter selection for SVM: The case of business intelligence categorization. Hsin-Hsiung Huang, Zijing Wang, Wingyan Chung |
| 2017 | End-to-end encrypted traffic classification with one-dimensional convolution neural networks. Wei Wang, Ming Zhu, Jinlin Wang, Xuewen Zeng, Zhongzhen Yang |
| 2017 | Enhance the robustness of cyber-physical systems by adding interdependency. Pengshuai Cui, Peidong Zhu, Peng Xun, Zhuoqun Xia |
| 2017 | Exploring linguistic features for extremist texts detection (on the material of Russian-speaking illegal texts). Dmitry Devyatkin, Ivan V. Smirnov, Ananyeva Margarita, Maria Kobozeva, Chepovskiy Andrey, Solovyev Fyodor |
| 2017 | Extended abstract: Anti-DDoS technique using self-learning bloom filter. C. Y. Tseung, Kam-Pui Chow, X. Zhang |
| 2017 | Hacking social network data mining. Yasmeen Alufaisan, Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham |
| 2017 | Hierarchical network threat situation assessment method for DDoS based on D-S evidence theory. Zihao Liu, Bin Zhang, Ning Zhu, Lixun Li |
| 2017 | Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence. John Grisham, Sagar Samtani, Mark W. Patton, Hsinchun Chen |
| 2017 | Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach. Ryan Williams, Emma McMahon, Sagar Samtani, Mark W. Patton, Hsinchun Chen |
| 2017 | Impact of human mobility on police allocation. Carlos Caminha, Vasco Furtado |
| 2017 | Impact of replacement policies on static-dynamic query results cache in web search engines. Hongyuan Ma, Ou Tao, Chunlu Zhao, Pengxiao Li, Lihong Wang |
| 2017 | Information sharing & cyber threats. Sonya H. Y. Hsu, Steven J. Dick |
| 2017 | Large scale port scanning through tor using parallel Nmap scans to scan large portions of the IPv4 range. Rodney R. Rohrmann, Vincent J. Ercolani, Mark W. Patton |
| 2017 | Linking social network accounts by modeling user spatiotemporal habits. Xiaohui Han, Lianhai Wang, Shujiang Xu, Guangqi Liu, Dawei Zhao |
| 2017 | Mapping users across social media platforms by integrating text and structure information. Song Sun, Qiudan Li, Peng Yan, Daniel Dajun Zeng |
| 2017 | Modeling online collective emotions through knowledge transfer. Saike He, Xiaolong Zheng, Daniel Zeng |
| 2017 | On Man-In-The-Cloud (MITC) attacks: The analytical case of Linux. Aaron Zimba, Zhaoshun Wang |
| 2017 | Online event detection and tracking in social media based on neural similarity metric learning. Guandan Chen, Qingchao Kong, Wenji Mao |
| 2017 | Phishing detection: A recent intelligent machine learning comparison based on models content and features. Neda Abdelhamid, Fadi A. Thabtah, Hussein Abdel-jaber |
| 2017 | Prioritized active learning for malicious URL detection using weighted text-based features. Sreyasee Das Bhattacharjee, Ashit Talukder, Ehab Al-Shaer, Pratik Doshi |
| 2017 | Proactive information security behavior and individual creativity: Effects of group culture and decentralized IT governance. Canchu Lin, Jenell L. S. Wittmer |
| 2017 | Raising flags: Detecting covert storage channels using relative entropy. Josephine K. Chow, Xiangyang Li, Xenia Mountrouidou |
| 2017 | Ranking events based on user relevant query. Xiangfei Kong, Wenji Mao |
| 2017 | Real-time prediction of meme burst. Jie Bai, Linjing Li, Lan Lu, Yanwu Yang, Daniel Zeng |
| 2017 | Reasoning crypto ransomware infection vectors with Bayesian networks. Aaron Zimba, Zhaoshun Wang, Hongsong Chen |
| 2017 | Recognizing military vehicles in social media images using deep learning. Tuomo Hiippala |
| 2017 | Research on high-resolution imaging technology to extract the halftone-dot-information by iPhone. Lu Luo, Peng Cao, Dazhong Mu |
| 2017 | Research on the relationship between informatization level and global competitiveness. Beibei Tian, Feifei Zheng, Yuqi Cao |
| 2017 | Resolving reflection methods in Android applications. Zhichao Cheng, Fanping Zeng, Xingqiu Zhong, Mingsong Zhou, Chengcheng Lv, Shuli Guo |
| 2017 | Static detection of Android malware based on improved random forest algorithm. Su Hou, Tianliang Lu, Yanhui Du, Jing Guo |
| 2017 | The dynamics of health sentiments with competitive interactions in social media. Saike He, Xiaolong Zheng, Daniel Zeng |
| 2017 | The impact of different perceived support dimensions of mobile media APP users on customer commitment and customer recommendation. Qian Li, Xiu-cun Wang |
| 2017 | Tie strength still matters: Investigating interaction patterns of Al-Qaeda network in terror operations. Ze Li, Duoyong Sun, Kun Cai, Bo Li |
| 2017 | Topic and user based refinement for competitive perspective identification. Junjie Lin, Wenji Mao, Daniel Zeng |
| 2017 | Topic evolution modeling in social media short texts based on recurrent semantic dependent CRP. Yuhao Zhang, Wenji Mao, Daniel Zeng |
| 2017 | Wavelet transform and unsupervised machine learning to detect insider threat on cloud file-sharing. Wangyan Feng, Wenfeng Yan, Shuning Wu, Ningwei Liu |
| 2017 | Web-derived Emotional Word Detection in social media using Latent Semantic information. Chiyu Cai, Linjing Li, Daniel Zeng |