ISI C

45 papers

YearTitle / Authors
20182018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018, Miami, FL, USA, November 9-11, 2018
2018A Broker Architecture, Push-Pull Database System for Intelligence Analysis.
Antonio Badia
2018A Partition and Interaction Combined Model for Social Event Popularity Prediction.
Guandan Chen, Qingchao Kong, Wenji Mao, Daniel Zeng
2018A Study of Data Fusion for Predicting Novel Activity in Enterprise Cyber-Security.
Jack Hogan, Niall M. Adams
2018A Temporal Recurrent Neural Network Approach to Detecting Market Anomaly Attacks Submission Type: Short Paper.
Yifan Huang, Wingyan Chung, Xinlin Tang
2018Adaptive Anomaly Detection on Network Data Streams.
Elizabeth Riddle-Workman, Marina Evangelou, Niall M. Adams
2018Analysing Indicator of Compromises for Ransomware: Leveraging IOCs with Machine Learning Techniques.
Mayank Verma, Ponnurangam Kumarguru, Shuva Brata Deb, Anuradha Gupta
2018Analysis of Hacking Related Trade in the Darkweb.
Othmane Cherqi, Ghita Mezzour, Mounir Ghogho, Mohammed El Koutbi
2018Attacklets: Modeling High Dimensionality in Real World Cyberattacks.
Cuneyt Gurcan Akcora, Jonathan Z. Bakdash, Yulia R. Gel, Murat Kantarcioglu, Laura R. Marusich, Bhavani Thuraisingham
2018Attention-based Multi-hop Reasoning for Knowledge Graph.
Zikang Wang, Linjing Li, Daniel Dajun Zeng, Yue Chen
2018Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency.
Emma McMahon, Mark W. Patton, Sagar Samtani, Hsinchun Chen
2018Copresence networks.
David B. Skillicorn, Christian Leuprecht
2018Correlation-based Dynamics and Systemic Risk Measures in the Cryptocurrency Market.
Jiaqi Liang, Linjing Li, Daniel Zeng, Yunwei Zhao
2018Cyber Resilience Framework for Industrial Control Systems: Concepts, Metrics, and Insights.
Md Ariful Haque, Gael Kamdem De Teyou, Sachin Shetty, Bheshaj Krishnappa
2018DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks.
Mohammed Almukaynizi, Ericsson Marin, Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Dipsy Kapoor, Timothy Siedlecki
2018DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection.
Arya Renjan, Karuna Pande Joshi, Sandeep Nair Narayanan, Anupam Joshi
2018Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning Approach.
Mohammadreza Ebrahimi, Mihai Surdeanu, Sagar Samtani, Hsinchun Chen
2018Detecting Saturation Attacks in Software-Defined Networks.
Zhiyuan Li, Weijia Xing, Dianxiang Xu
2018Directed Digital Hate.
Björn Pelzer, Lisa Kaati, Nazar Akrami
2018Early Identification of Pathogenic Social Media Accounts.
Hamidreza Alvari, Elham Shaabani, Paulo Shakarian
2018Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning.
Maede Zolanvari, Marcio Andrey Teixeira, Raj Jain
2018Evaluation of crime topic models: topic coherence vs spatial crime concentration.
Ritika Pandey, George O. Mohler
2018Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates.
Mehdi Zakroum, Abdellah Houmz, Mounir Ghogho, Ghita Mezzour, Abdelkader Lahmadi, Jérôme François, Mohammed El Koutbi
2018Extracting Textual Features of Financial Social Media to Detect Cognitive Hacking.
Wingyan Chung, Jinwei Liu, Xinlin Tang, Vincent Siu-king Lai
2018Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts.
Stephen Moskal, Shanchieh Jay Yang, Michael E. Kuhl
2018Finding Cryptocurrency Attack Indicators Using Temporal Logic and Darkweb Data.
Mohammed Almukaynizi, Vivin Paliath, Malay Shah, Malav Shah, Paulo Shakarian
2018From Public Gatherings to the Burst of Collective Violence: An Agent-based Emotion Contagion Model.
Lida Huang, Guoray Cai, Hongyong Yuan, Jianguo Chen
2018Identifying Privacy Functional Requirements for Crowdsourcing Applications in Smart Cities.
Monica da Silva, José Viterbo, Flávia Bernardini, Cristiano Maciel
2018Identifying, Collecting, and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMs.
Po-Yi Du, Ning Zhang, Mohammadreza Ebrahimi, Sagar Samtani, Ben Lazarine, Nolan Arnold, Rachael Dunn, Sandeep Suntwal, Guadalupe Angeles, Robert Schweitzer, Hsinchun Chen
2018Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study.
Ryan Williams, Sagar Samtani, Mark W. Patton, Hsinchun Chen
2018Joint Learning with Keyword Extraction for Event Detection in Social Media.
Guandan Chen, Wenji Mao, Qingchao Kong, Han Han
2018Leveraging Intra-Day Temporal Variations to Predict Daily Cyberattack Activity.
Gordon Werner, Shanchieh Yang, Katie McConky
2018Lifting the Smokescreen: Detecting Underlying Anomalies During a DDoS Attack.
Brian Ricks, Bhavani Thuraisingham, Patrick Tague
2018Measuring the Effectiveness of Network Deception.
Shridatt Sugrim, Sridhar Venkatesan, Jason A. Youzwak, Cho-Yu Jason Chiang, Ritu Chadha, Massimiliano Albanese, Hasan Cam
2018Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports.
Lorenzo Neil, Sudip Mittal, Anupam Joshi
2018PhishMon: A Machine Learning Framework for Detecting Phishing Webpages.
Amirreza Niakanlahiji, Bei-Tseng Chu, Ehab Al-Shaer
2018Political Bots and the Swedish General Election.
Johan Fernquist, Lisa Kaati, Ralph Schroeder
2018Privacy Preserving on Trajectories Created by Wi-Fi Connections in a University Campus.
Fernanda Oliveira Gomes, Douglas Simões Silva, Bruno Machado Agostinho, Jean Everson Martina
2018Putting all eggs in a single basket: A cross-community analysis of 12 hacking forums.
Richard Frank, Myfanwy Thomson, Alexander Mikhaylov, Andrew J. Park
2018SPERG: Scalable Political Event Report Geoparsing in Big Data.
Aswin Krishna Gunasekaran, Maryam Bahojb Imani, Latifur Khan, Christan Grant, Patrick T. Brandt, Jennifer S. Holmes
2018Security Analysis of the RaSTA Safety Protocol.
Markus Heinrich, Jannik Vieten, Tolga Arul, Stefan Katzenbeisser
2018Spatial Patterns of Offender Groups.
Mohammad A. Tayebi, Hamed Yaghoubi Shahir, Uwe Glässer, Patricia L. Brantingham
2018Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence.
Priyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna Pande Joshi
2018Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence.
Ghaith Husari, Xi Niu, Bill Chu, Ehab Al-Shaer
2018Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions.
Christopher R. Harrell, Mark W. Patton, Hsinchun Chen, Sagar Samtani