ISI C

52 papers

YearTitle / Authors
2020A Bootstrapped Model to Detect Abuse and Intent in White Supremacist Corpora.
B. Simons, David B. Skillicorn
2020A Comparative Study on Contemporary Intrusion Detection Datasets for Machine Learning Research.
Smirti Dwibedi, Medha Pujari, Weiqing Sun
2020A Generative Adversarial Learning Framework for Breaking Text-Based CAPTCHA in the Dark Web.
Ning Zhang, Mohammadreza Ebrahimi, Weifeng Li, Hsinchun Chen
2020A Human-Network-Security-Interface for an Average Joe.
Rajasekhar Ganduri, Ram Dantu, Mark A. Thompson, Samuel Evans, Logan Widick
2020A KG-based Enhancement Framework for Fact Checking Using Category Information.
Shuai Wang, Lei Wang, Wenji Mao
2020A Proxy-Based Encrypted Online Social Network With Fine-Grained Access.
Fabian Schillinger, Christian Schindelhauer
2020A Survey of Real-Time Social-Based Traffic Detection.
Hashim Abu-gellban
2020A virtual simulation environment using deep learning for autonomous vehicles obstacle avoidance.
Leila Haj Meftah, Rafik Braham
2020APIN: Automatic Attack Path Identification in Computer Networks.
Eric Ficke, Shouhuai Xu
2020Adaptive and Predictive SDN Control During DDoS Attacks.
Jagannadh Vempati, Ram Dantu, Syed Badruddoja, Mark A. Thompson
2020An Expert System for Classifying Harmful Content on the Dark Web.
Hanae Kobayashi, Masashi Kadoguchi, Shota Hayashi, Akira Otsuka, Masaki Hashimoto
2020An Ordinal Approach to Modeling and Visualizing Phishing Susceptibility.
David G. Dobolyi, Ahmed Abbasi, F. Mariam Zahedi, Anthony Vance
2020Analyzing the Evolutionary Characteristics of the Cluster of COVID-19 under Anti-contagion Policies.
Pu Miao, Hu Tian, Xingwei Zhang, Saike He, Xiaolong Zheng, Desheng Dash Wu, Daniel Zeng
2020Assessing GAN-based approaches for generative modeling of crime text reports.
Samira Khorshidi, George O. Mohler, Jeremy G. Carter
2020Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement Learning.
Arnab Bhattacharya, Thiagarajan Ramachandran, Sandeep Banik, Chase P. Dowling, Shaunak D. Bopardikar
2020Characterizing the Landscape of COVID-19 Themed Cyberattacks and Defenses.
Mir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu, Shouhuai Xu
2020Conceptual Models for Counter-Terrorism and Intelligence Knowledge Bases.
Antonio Badia
2020Cybersecurity Threat Intelligence Augmentation and Embedding Improvement - A Healthcare Usecase.
Matthew Sills, Priyanka Ranade, Sudip Mittal
2020Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites.
Mir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu, Shouhuai Xu
2020Deep Self-Supervised Clustering of the Dark Web for Cyber Threat Intelligence.
Masashi Kadoguchi, Hanae Kobayashi, Shota Hayashi, Akira Otsuka, Masaki Hashimoto
2020DeepGuard: Deep Generative User-behavior Analytics for Ransomware Detection.
Gaddisa Olani Ganfure, Chun-Feng Wu, Yuan-Hao Chang, Wei-Kuan Shih
2020Detecting Cyber-Adversarial Videos in Traditional Social media.
Bingyan Du, Pranay Singhal, Victor A. Benjamin, Weifeng Li
2020Detection of Malicious Domains Using Passive DNS with XGBoost.
Marcos Rogério Silveira, Adriano Mauro Cansian, Hugo Koji Kobayashi
2020Discerning User Activity in Extended Reality Through Side-Channel Accelerometer Observations.
Tiago Martins Andrade, Max Smith-Creasey, Jonathan Francis Roscoe
2020Effective Voice Fuzzing Method for Finding Vulnerabilities in AI Speech Recognition Devices.
So-Hyun Park, Il-Gu Lee
2020Efficient and Secure Implementation of BLS Multisignature Scheme on TPM.
Mustapha Hedabou, Yunusa Simpa Abdulsalam
2020Evaluating Effectiveness of Adversarial Examples on State of Art License Plate Recognition Models.
Kanishk Rana, Rahul Madaan
2020Fraud Prevention Within the Brazilian Governmental Public-Key Infrastructure.
Fernanda Oliveira Gomes, Bruno Machado Agostinho, Jean Everson Martina
2020From Word Embedding to Cyber-Phrase Embedding: Comparison of Processing Cybersecurity Texts.
Moumita Das Purba, Bill Chu, Ehab Al-Shaer
2020Heuristic Phishing Detection and URL Checking Methodology Based on Scraping and Web Crawling.
Rômulo Almeida, Carla M. Westphall
2020IEEE International Conference on Intelligence and Security Informatics, ISI 2020, Arlington, VA, USA, November 9-10, 2020
2020Identifying Proficient Cybercriminals Through Text and Network Analysis.
Jan William Johnsen, Katrin Franke
2020Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Ben Lazarine, Sagar Samtani, Mark W. Patton, Hongyi Zhu, Steven Ullman, Benjamin Ampel, Hsinchun Chen
2020Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web.
Yizhi Liu, Fang Yu Lin, Zara Ahmad-Post, Mohammadreza Ebrahimi, Ning Zhang, James Lee Hu, Jingyu Xin, Weifeng Li, Hsinchun Chen
2020Improving the Data Quality for Credit Card Fraud Detection.
Rongrong Jing, Hu Tian, Yidi Li, Xingwei Zhang, Xiaolong Zheng, Zhu Zhang, Daniel Zeng
2020Is the user identity perception influenced by the blockchain technology?
Andreea-Elena Panait
2020Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior.
Aritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, Tim Finin
2020Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach.
Benjamin Ampel, Sagar Samtani, Hongyi Zhu, Steven Ullman, Hsinchun Chen
2020Malware Family Fingerprinting Through Behavioral Analysis.
Aaron Walker, Shamik Sengupta
2020Multi-Dimensional Anomalous Entity Detection via Poisson Tensor Factorization.
Maksim Ekin Eren, Juston S. Moore, Boian S. Alexandrov
2020Performance Analysis of Secure Real-time Transport Protocol Using Elliptic Curves.
Nilanjan Sen, Ram Dantu, Mark A. Thompson
2020Phishcasting: Deep Learning for Time Series Forecasting of Phishing Attacks.
Syed Hasan Amin Mahmood, Syed Mustafa Ali Abbasi, Ahmed Abbasi, Fareed Zaffar
2020Political Fake Statement Detection via Multistage Feature-assisted Neural Modeling.
Fuad Mire Hassan, Mark Lee
2020Scalable Malware Clustering using Multi-Stage Tree Parallelization.
Muqeet Ali, Josiah Hagen, Jonathan Oliver
2020Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification.
Bibek Upadhayay, Vahid Behzadan
2020Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Steven Ullman, Sagar Samtani, Ben Lazarine, Hongyi Zhu, Benjamin Ampel, Mark W. Patton, Hsinchun Chen
2020Social Emotion Cause Extraction from Online Texts.
Xinglin Xiao, Lei Wang, Qingchao Kong, Wenji Mao
2020The Four-Stages Strategies on Social Media to Cope with "Infodemic" and Repair Public Trust: Covid-19 Disinformation and Effectiveness of Government Intervention in China.
Yonghan Zhu, Yuqiao Jiang
2020Towards a Story Scheme Ontology of Terrorist MOs.
Joeri G. T. Peters, Floris J. Bex
2020Twitter Bot Detection with Reduced Feature Set.
Jefferson Viana Fonseca Abreu, Célia Ghedini Ralha, João José Costa Gondim
2020Weaponizing Unicodes with Deep Learning -Identifying Homoglyphs with Weakly Labeled Data.
Perry Deng, Cooper Linsky, Matthew Wright
2020XGBoosted Misuse Detection in LAN-Internal Traffic Dataset.
Zhiqing Zhang, Pawissakan Chirupphapa, Hiroshi Esaki, Hideya Ochiai