| 2020 | A Bootstrapped Model to Detect Abuse and Intent in White Supremacist Corpora. B. Simons, David B. Skillicorn |
| 2020 | A Comparative Study on Contemporary Intrusion Detection Datasets for Machine Learning Research. Smirti Dwibedi, Medha Pujari, Weiqing Sun |
| 2020 | A Generative Adversarial Learning Framework for Breaking Text-Based CAPTCHA in the Dark Web. Ning Zhang, Mohammadreza Ebrahimi, Weifeng Li, Hsinchun Chen |
| 2020 | A Human-Network-Security-Interface for an Average Joe. Rajasekhar Ganduri, Ram Dantu, Mark A. Thompson, Samuel Evans, Logan Widick |
| 2020 | A KG-based Enhancement Framework for Fact Checking Using Category Information. Shuai Wang, Lei Wang, Wenji Mao |
| 2020 | A Proxy-Based Encrypted Online Social Network With Fine-Grained Access. Fabian Schillinger, Christian Schindelhauer |
| 2020 | A Survey of Real-Time Social-Based Traffic Detection. Hashim Abu-gellban |
| 2020 | A virtual simulation environment using deep learning for autonomous vehicles obstacle avoidance. Leila Haj Meftah, Rafik Braham |
| 2020 | APIN: Automatic Attack Path Identification in Computer Networks. Eric Ficke, Shouhuai Xu |
| 2020 | Adaptive and Predictive SDN Control During DDoS Attacks. Jagannadh Vempati, Ram Dantu, Syed Badruddoja, Mark A. Thompson |
| 2020 | An Expert System for Classifying Harmful Content on the Dark Web. Hanae Kobayashi, Masashi Kadoguchi, Shota Hayashi, Akira Otsuka, Masaki Hashimoto |
| 2020 | An Ordinal Approach to Modeling and Visualizing Phishing Susceptibility. David G. Dobolyi, Ahmed Abbasi, F. Mariam Zahedi, Anthony Vance |
| 2020 | Analyzing the Evolutionary Characteristics of the Cluster of COVID-19 under Anti-contagion Policies. Pu Miao, Hu Tian, Xingwei Zhang, Saike He, Xiaolong Zheng, Desheng Dash Wu, Daniel Zeng |
| 2020 | Assessing GAN-based approaches for generative modeling of crime text reports. Samira Khorshidi, George O. Mohler, Jeremy G. Carter |
| 2020 | Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement Learning. Arnab Bhattacharya, Thiagarajan Ramachandran, Sandeep Banik, Chase P. Dowling, Shaunak D. Bopardikar |
| 2020 | Characterizing the Landscape of COVID-19 Themed Cyberattacks and Defenses. Mir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu, Shouhuai Xu |
| 2020 | Conceptual Models for Counter-Terrorism and Intelligence Knowledge Bases. Antonio Badia |
| 2020 | Cybersecurity Threat Intelligence Augmentation and Embedding Improvement - A Healthcare Usecase. Matthew Sills, Priyanka Ranade, Sudip Mittal |
| 2020 | Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites. Mir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu, Shouhuai Xu |
| 2020 | Deep Self-Supervised Clustering of the Dark Web for Cyber Threat Intelligence. Masashi Kadoguchi, Hanae Kobayashi, Shota Hayashi, Akira Otsuka, Masaki Hashimoto |
| 2020 | DeepGuard: Deep Generative User-behavior Analytics for Ransomware Detection. Gaddisa Olani Ganfure, Chun-Feng Wu, Yuan-Hao Chang, Wei-Kuan Shih |
| 2020 | Detecting Cyber-Adversarial Videos in Traditional Social media. Bingyan Du, Pranay Singhal, Victor A. Benjamin, Weifeng Li |
| 2020 | Detection of Malicious Domains Using Passive DNS with XGBoost. Marcos Rogério Silveira, Adriano Mauro Cansian, Hugo Koji Kobayashi |
| 2020 | Discerning User Activity in Extended Reality Through Side-Channel Accelerometer Observations. Tiago Martins Andrade, Max Smith-Creasey, Jonathan Francis Roscoe |
| 2020 | Effective Voice Fuzzing Method for Finding Vulnerabilities in AI Speech Recognition Devices. So-Hyun Park, Il-Gu Lee |
| 2020 | Efficient and Secure Implementation of BLS Multisignature Scheme on TPM. Mustapha Hedabou, Yunusa Simpa Abdulsalam |
| 2020 | Evaluating Effectiveness of Adversarial Examples on State of Art License Plate Recognition Models. Kanishk Rana, Rahul Madaan |
| 2020 | Fraud Prevention Within the Brazilian Governmental Public-Key Infrastructure. Fernanda Oliveira Gomes, Bruno Machado Agostinho, Jean Everson Martina |
| 2020 | From Word Embedding to Cyber-Phrase Embedding: Comparison of Processing Cybersecurity Texts. Moumita Das Purba, Bill Chu, Ehab Al-Shaer |
| 2020 | Heuristic Phishing Detection and URL Checking Methodology Based on Scraping and Web Crawling. Rômulo Almeida, Carla M. Westphall |
| 2020 | IEEE International Conference on Intelligence and Security Informatics, ISI 2020, Arlington, VA, USA, November 9-10, 2020 |
| 2020 | Identifying Proficient Cybercriminals Through Text and Network Analysis. Jan William Johnsen, Katrin Franke |
| 2020 | Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach. Ben Lazarine, Sagar Samtani, Mark W. Patton, Hongyi Zhu, Steven Ullman, Benjamin Ampel, Hsinchun Chen |
| 2020 | Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web. Yizhi Liu, Fang Yu Lin, Zara Ahmad-Post, Mohammadreza Ebrahimi, Ning Zhang, James Lee Hu, Jingyu Xin, Weifeng Li, Hsinchun Chen |
| 2020 | Improving the Data Quality for Credit Card Fraud Detection. Rongrong Jing, Hu Tian, Yidi Li, Xingwei Zhang, Xiaolong Zheng, Zhu Zhang, Daniel Zeng |
| 2020 | Is the user identity perception influenced by the blockchain technology? Andreea-Elena Panait |
| 2020 | Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior. Aritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, Tim Finin |
| 2020 | Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach. Benjamin Ampel, Sagar Samtani, Hongyi Zhu, Steven Ullman, Hsinchun Chen |
| 2020 | Malware Family Fingerprinting Through Behavioral Analysis. Aaron Walker, Shamik Sengupta |
| 2020 | Multi-Dimensional Anomalous Entity Detection via Poisson Tensor Factorization. Maksim Ekin Eren, Juston S. Moore, Boian S. Alexandrov |
| 2020 | Performance Analysis of Secure Real-time Transport Protocol Using Elliptic Curves. Nilanjan Sen, Ram Dantu, Mark A. Thompson |
| 2020 | Phishcasting: Deep Learning for Time Series Forecasting of Phishing Attacks. Syed Hasan Amin Mahmood, Syed Mustafa Ali Abbasi, Ahmed Abbasi, Fareed Zaffar |
| 2020 | Political Fake Statement Detection via Multistage Feature-assisted Neural Modeling. Fuad Mire Hassan, Mark Lee |
| 2020 | Scalable Malware Clustering using Multi-Stage Tree Parallelization. Muqeet Ali, Josiah Hagen, Jonathan Oliver |
| 2020 | Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification. Bibek Upadhayay, Vahid Behzadan |
| 2020 | Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach. Steven Ullman, Sagar Samtani, Ben Lazarine, Hongyi Zhu, Benjamin Ampel, Mark W. Patton, Hsinchun Chen |
| 2020 | Social Emotion Cause Extraction from Online Texts. Xinglin Xiao, Lei Wang, Qingchao Kong, Wenji Mao |
| 2020 | The Four-Stages Strategies on Social Media to Cope with "Infodemic" and Repair Public Trust: Covid-19 Disinformation and Effectiveness of Government Intervention in China. Yonghan Zhu, Yuqiao Jiang |
| 2020 | Towards a Story Scheme Ontology of Terrorist MOs. Joeri G. T. Peters, Floris J. Bex |
| 2020 | Twitter Bot Detection with Reduced Feature Set. Jefferson Viana Fonseca Abreu, Célia Ghedini Ralha, João José Costa Gondim |
| 2020 | Weaponizing Unicodes with Deep Learning -Identifying Homoglyphs with Weakly Labeled Data. Perry Deng, Cooper Linsky, Matthew Wright |
| 2020 | XGBoosted Misuse Detection in LAN-Internal Traffic Dataset. Zhiqing Zhang, Pawissakan Chirupphapa, Hiroshi Esaki, Hideya Ochiai |