default search action
ISI 2018: Miami, FL, USA
- 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018, Miami, FL, USA, November 9-11, 2018. IEEE 2018, ISBN 978-1-5386-7848-0
Threat Intelligence
- Ghaith Husari, Xi Niu, Bill Chu, Ehab Al-Shaer:
Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence. 1-6 - Lorenzo Neil, Sudip Mittal, Anupam Joshi:
Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports. 7-12
Cyberattacks - I
- Mohammad A. Tayebi, Hamed Yaghoubi Shahir, Uwe Glässer, Patricia L. Brantingham:
Spatial Patterns of Offender Groups. 13-18 - Elizabeth Riddle-Workman, Marina Evangelou, Niall M. Adams:
Adaptive Anomaly Detection on Network Data Streams. 19-24 - Md Ariful Haque, Gael Kamdem De Teyou, Sachin Shetty, Bheshaj Krishnappa:
Cyber Resilience Framework for Industrial Control Systems: Concepts, Metrics, and Insights. 25-30 - Mohammed Almukaynizi, Ericsson Marin, Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Dipsy Kapoor, Timothy Siedlecki:
DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks. 31-36
Cyberattacks - II
- Jack Hogan, Niall M. Adams:
A Study of Data Fusion for Predicting Novel Activity in Enterprise Cyber-Security. 37-42 - Jiaqi Liang, Linjing Li, Daniel Zeng, Yunwei Zhao:
Correlation-based Dynamics and Systemic Risk Measures in the Cryptocurrency Market. 43-48 - Stephen Moskal, Shanchieh Jay Yang, Michael E. Kuhl:
Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts. 49-54 - Cuneyt Gurcan Akcora, Jonathan Z. Bakdash, Yulia R. Gel, Murat Kantarcioglu, Laura R. Marusich, Bhavani Thuraisingham:
Attacklets: Modeling High Dimensionality in Real World Cyberattacks. 55-57
Cybercrime Prediction
- Gordon Werner, Shanchieh Yang, Katie McConky:
Leveraging Intra-Day Temporal Variations to Predict Daily Cyberattack Activity. 58-63 - Arya Renjan, Karuna Pande Joshi, Sandeep Nair Narayanan, Anupam Joshi:
DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection. 64-69 - Po-Yi Du, Ning Zhang, Mohammadreza Ebrahimi, Sagar Samtani, Ben Lazarine, Nolan Arnold, Rachael Dunn, Sandeep Suntwal, Guadalupe Angeles, Robert Schweitzer, Hsinchun Chen:
Identifying, Collecting, and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMs. 70-75 - Ritika Pandey, George O. Mohler:
Evaluation of crime topic models: topic coherence vs spatial crime concentration. 76-78
Darkweb
- Othmane Cherqi, Ghita Mezzour, Mounir Ghogho, Mohammed El Koutbi:
Analysis of Hacking Related Trade in the Darkweb. 79-84 - Mohammadreza Ebrahimi, Mihai Surdeanu, Sagar Samtani, Hsinchun Chen:
Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning Approach. 85-90 - Mohammed Almukaynizi, Vivin Paliath, Malay Shah, Malav Shah, Paulo Shakarian:
Finding Cryptocurrency Attack Indicators Using Temporal Logic and Darkweb Data. 91-93
IoT & Smartcities
- Ryan Williams, Sagar Samtani, Mark W. Patton, Hsinchun Chen:
Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study. 94-99 - Emma McMahon, Mark W. Patton, Sagar Samtani, Hsinchun Chen:
Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency. 100-105 - Monica da Silva, José Viterbo, Flávia Bernardini, Cristiano Maciel:
Identifying Privacy Functional Requirements for Crowdsourcing Applications in Smart Cities. 106-111 - Maede Zolanvari, Marcio Andrey Teixeira, Raj Jain:
Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning. 112-117
Threat Intelligence
- David B. Skillicorn, Christian Leuprecht:
Copresence networks. 118-123 - Johan Fernquist, Lisa Kaati, Ralph Schroeder:
Political Bots and the Swedish General Election. 124-129 - Brian Ricks, Bhavani Thuraisingham, Patrick Tague:
Lifting the Smokescreen: Detecting Underlying Anomalies During a DDoS Attack. 130-135 - Richard Frank, Myfanwy Thomson, Alexander Mikhaylov, Andrew J. Park:
Putting all eggs in a single basket: A cross-community analysis of 12 hacking forums. 136-141
Vulnerability & Anamoly Detection
- Shridatt Sugrim, Sridhar Venkatesan, Jason A. Youzwak, Cho-Yu Jason Chiang, Ritu Chadha, Massimiliano Albanese, Hasan Cam:
Measuring the Effectiveness of Network Deception. 142-147 - Christopher R. Harrell, Mark W. Patton, Hsinchun Chen, Sagar Samtani:
Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions. 148-153 - Mayank Verma, Ponnurangam Kumarguru, Shuva Brata Deb, Anuradha Gupta:
Analysing Indicator of Compromises for Ransomware: Leveraging IOCs with Machine Learning Techniques. 154-159 - Yifan Huang, Wingyan Chung, Xinlin Tang:
A Temporal Recurrent Neural Network Approach to Detecting Market Anomaly Attacks Submission Type: Short Paper. 160-162
Threat Intelligence
- Zhiyuan Li, Weijia Xing, Dianxiang Xu:
Detecting Saturation Attacks in Software-Defined Networks. 163-168 - Hamidreza Alvari, Elham Shaabani, Paulo Shakarian:
Early Identification of Pathogenic Social Media Accounts. 169-174 - Mehdi Zakroum, Abdellah Houmz, Mounir Ghogho, Ghita Mezzour, Abdelkader Lahmadi, Jérôme François, Mohammed El Koutbi:
Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates. 175-180 - Fernanda Oliveira Gomes, Douglas Simões Silva, Bruno Machado Agostinho, Jean Everson Martina:
Privacy Preserving on Trajectories Created by Wi-Fi Connections in a University Campus. 181-186
Big Data
- Aswin Krishna Gunasekaran, Maryam Bahojb Imani, Latifur Khan, Christan Grant, Patrick T. Brandt, Jennifer S. Holmes:
SPERG: Scalable Political Event Report Geoparsing in Big Data. 187-192 - Lida Huang, Guoray Cai, Hongyong Yuan, Jianguo Chen:
From Public Gatherings to the Burst of Collective Violence: An Agent-based Emotion Contagion Model. 193-198 - Markus Heinrich, Jannik Vieten, Tolga Arul, Stefan Katzenbeisser:
Security Analysis of the RaSTA Safety Protocol. 199-204 - Björn Pelzer, Lisa Kaati, Nazar Akrami:
Directed Digital Hate. 205-210 - Zikang Wang, Linjing Li, Daniel Dajun Zeng, Yue Chen:
Attention-based Multi-hop Reasoning for Knowledge Graph. 211-213
Text and Social Media
- Guandan Chen, Wenji Mao, Qingchao Kong, Han Han:
Joint Learning with Keyword Extraction for Event Detection in Social Media. 214-219 - Amirreza Niakanlahiji, Bei-Tseng Chu, Ehab Al-Shaer:
PhishMon: A Machine Learning Framework for Detecting Phishing Webpages. 220-225 - Antonio Badia:
A Broker Architecture, Push-Pull Database System for Intelligence Analysis. 226-231 - Guandan Chen, Qingchao Kong, Wenji Mao, Daniel Zeng:
A Partition and Interaction Combined Model for Social Event Popularity Prediction. 232-237
Final Session
- Priyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna Pande Joshi:
Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence. 238-243 - Wingyan Chung, Jinwei Liu, Xinlin Tang, Vincent Siu-king Lai:
Extracting Textual Features of Financial Social Media to Detect Cognitive Hacking. 244-246
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.