| 2018 | 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018, Miami, FL, USA, November 9-11, 2018 |
| 2018 | A Broker Architecture, Push-Pull Database System for Intelligence Analysis. Antonio Badia |
| 2018 | A Partition and Interaction Combined Model for Social Event Popularity Prediction. Guandan Chen, Qingchao Kong, Wenji Mao, Daniel Zeng |
| 2018 | A Study of Data Fusion for Predicting Novel Activity in Enterprise Cyber-Security. Jack Hogan, Niall M. Adams |
| 2018 | A Temporal Recurrent Neural Network Approach to Detecting Market Anomaly Attacks Submission Type: Short Paper. Yifan Huang, Wingyan Chung, Xinlin Tang |
| 2018 | Adaptive Anomaly Detection on Network Data Streams. Elizabeth Riddle-Workman, Marina Evangelou, Niall M. Adams |
| 2018 | Analysing Indicator of Compromises for Ransomware: Leveraging IOCs with Machine Learning Techniques. Mayank Verma, Ponnurangam Kumarguru, Shuva Brata Deb, Anuradha Gupta |
| 2018 | Analysis of Hacking Related Trade in the Darkweb. Othmane Cherqi, Ghita Mezzour, Mounir Ghogho, Mohammed El Koutbi |
| 2018 | Attacklets: Modeling High Dimensionality in Real World Cyberattacks. Cuneyt Gurcan Akcora, Jonathan Z. Bakdash, Yulia R. Gel, Murat Kantarcioglu, Laura R. Marusich, Bhavani Thuraisingham |
| 2018 | Attention-based Multi-hop Reasoning for Knowledge Graph. Zikang Wang, Linjing Li, Daniel Dajun Zeng, Yue Chen |
| 2018 | Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency. Emma McMahon, Mark W. Patton, Sagar Samtani, Hsinchun Chen |
| 2018 | Copresence networks. David B. Skillicorn, Christian Leuprecht |
| 2018 | Correlation-based Dynamics and Systemic Risk Measures in the Cryptocurrency Market. Jiaqi Liang, Linjing Li, Daniel Zeng, Yunwei Zhao |
| 2018 | Cyber Resilience Framework for Industrial Control Systems: Concepts, Metrics, and Insights. Md Ariful Haque, Gael Kamdem De Teyou, Sachin Shetty, Bheshaj Krishnappa |
| 2018 | DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks. Mohammed Almukaynizi, Ericsson Marin, Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Dipsy Kapoor, Timothy Siedlecki |
| 2018 | DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection. Arya Renjan, Karuna Pande Joshi, Sandeep Nair Narayanan, Anupam Joshi |
| 2018 | Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning Approach. Mohammadreza Ebrahimi, Mihai Surdeanu, Sagar Samtani, Hsinchun Chen |
| 2018 | Detecting Saturation Attacks in Software-Defined Networks. Zhiyuan Li, Weijia Xing, Dianxiang Xu |
| 2018 | Directed Digital Hate. Björn Pelzer, Lisa Kaati, Nazar Akrami |
| 2018 | Early Identification of Pathogenic Social Media Accounts. Hamidreza Alvari, Elham Shaabani, Paulo Shakarian |
| 2018 | Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning. Maede Zolanvari, Marcio Andrey Teixeira, Raj Jain |
| 2018 | Evaluation of crime topic models: topic coherence vs spatial crime concentration. Ritika Pandey, George O. Mohler |
| 2018 | Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates. Mehdi Zakroum, Abdellah Houmz, Mounir Ghogho, Ghita Mezzour, Abdelkader Lahmadi, Jérôme François, Mohammed El Koutbi |
| 2018 | Extracting Textual Features of Financial Social Media to Detect Cognitive Hacking. Wingyan Chung, Jinwei Liu, Xinlin Tang, Vincent Siu-king Lai |
| 2018 | Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts. Stephen Moskal, Shanchieh Jay Yang, Michael E. Kuhl |
| 2018 | Finding Cryptocurrency Attack Indicators Using Temporal Logic and Darkweb Data. Mohammed Almukaynizi, Vivin Paliath, Malay Shah, Malav Shah, Paulo Shakarian |
| 2018 | From Public Gatherings to the Burst of Collective Violence: An Agent-based Emotion Contagion Model. Lida Huang, Guoray Cai, Hongyong Yuan, Jianguo Chen |
| 2018 | Identifying Privacy Functional Requirements for Crowdsourcing Applications in Smart Cities. Monica da Silva, José Viterbo, Flávia Bernardini, Cristiano Maciel |
| 2018 | Identifying, Collecting, and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMs. Po-Yi Du, Ning Zhang, Mohammadreza Ebrahimi, Sagar Samtani, Ben Lazarine, Nolan Arnold, Rachael Dunn, Sandeep Suntwal, Guadalupe Angeles, Robert Schweitzer, Hsinchun Chen |
| 2018 | Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study. Ryan Williams, Sagar Samtani, Mark W. Patton, Hsinchun Chen |
| 2018 | Joint Learning with Keyword Extraction for Event Detection in Social Media. Guandan Chen, Wenji Mao, Qingchao Kong, Han Han |
| 2018 | Leveraging Intra-Day Temporal Variations to Predict Daily Cyberattack Activity. Gordon Werner, Shanchieh Yang, Katie McConky |
| 2018 | Lifting the Smokescreen: Detecting Underlying Anomalies During a DDoS Attack. Brian Ricks, Bhavani Thuraisingham, Patrick Tague |
| 2018 | Measuring the Effectiveness of Network Deception. Shridatt Sugrim, Sridhar Venkatesan, Jason A. Youzwak, Cho-Yu Jason Chiang, Ritu Chadha, Massimiliano Albanese, Hasan Cam |
| 2018 | Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports. Lorenzo Neil, Sudip Mittal, Anupam Joshi |
| 2018 | PhishMon: A Machine Learning Framework for Detecting Phishing Webpages. Amirreza Niakanlahiji, Bei-Tseng Chu, Ehab Al-Shaer |
| 2018 | Political Bots and the Swedish General Election. Johan Fernquist, Lisa Kaati, Ralph Schroeder |
| 2018 | Privacy Preserving on Trajectories Created by Wi-Fi Connections in a University Campus. Fernanda Oliveira Gomes, Douglas Simões Silva, Bruno Machado Agostinho, Jean Everson Martina |
| 2018 | Putting all eggs in a single basket: A cross-community analysis of 12 hacking forums. Richard Frank, Myfanwy Thomson, Alexander Mikhaylov, Andrew J. Park |
| 2018 | SPERG: Scalable Political Event Report Geoparsing in Big Data. Aswin Krishna Gunasekaran, Maryam Bahojb Imani, Latifur Khan, Christan Grant, Patrick T. Brandt, Jennifer S. Holmes |
| 2018 | Security Analysis of the RaSTA Safety Protocol. Markus Heinrich, Jannik Vieten, Tolga Arul, Stefan Katzenbeisser |
| 2018 | Spatial Patterns of Offender Groups. Mohammad A. Tayebi, Hamed Yaghoubi Shahir, Uwe Glässer, Patricia L. Brantingham |
| 2018 | Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence. Priyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna Pande Joshi |
| 2018 | Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence. Ghaith Husari, Xi Niu, Bill Chu, Ehab Al-Shaer |
| 2018 | Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions. Christopher R. Harrell, Mark W. Patton, Hsinchun Chen, Sagar Samtani |