Visualizing Cyber Personality
S Park, D Choi, J Kim - AMCIS 2004 Proceedings, 2004 - aisel.aisnet.org
… personality on websites. Second, we explored and identified the relationships between e-brand
personalities and … We defined four e-brand personality factors and nineteen personality …
personalities and … We defined four e-brand personality factors and nineteen personality …
A survey on human and personality vulnerability assessment in cyber-security: Challenges, approaches, and open issues
… personality traits of an individual can be measured through a questionnaire of 50 questions
[66]. Personality traits can serve as indicators of the cyber-… that certain personality traits, like …
[66]. Personality traits can serve as indicators of the cyber-… that certain personality traits, like …
A comprehensive framework for cyber behavioral analysis based on a systematic review of cyber profiling literature
M Martineau, E Spiridon, M Aiken - Forensic Sciences, 2023 - mdpi.com
… on cyber profiling as a foundation for the development of a comprehensive framework for
applying profiling techniques to cybercrime—described as cyber … base in cyber behavioral …
applying profiling techniques to cybercrime—described as cyber … base in cyber behavioral …
Learning models to detect personality traits of cyber attackers: a combined approach using honeypot and surveys.
CJ Martínez Santander - 2024 - bibdigital.epn.edu.ec
… approach to detecting hacker personality traits. By combining … holistic perspective on the
psychology of cyber-attacks. This … and classify relevant personality traits in the context of cyber-…
psychology of cyber-attacks. This … and classify relevant personality traits in the context of cyber-…
Fostering Cyber-Physical Social Systems through an Ontological Approach to Personality Classification Based on Social Media Posts
… of personality study. We have found that there are many studies aimed at linking personality
… The Data Visualization Engine, which provides the output as a dashboard containing two …
… The Data Visualization Engine, which provides the output as a dashboard containing two …
An organizational visualization profiler tool based on social interactions
P Karampelas - … in Action: Technologies for Civilian, Military and Cyber …, 2018 - Springer
… the insider threat is that of the proactive personality or behavioral analysis of the employees.
… Moreover, an attempt is presented to classify employees into personality models monitoring …
… Moreover, an attempt is presented to classify employees into personality models monitoring …
A management system for cyber individuals and heterogeneous data
… in Cyber-I’s growth. Numerous things can be done with the help of the Big Five personality
… Jquery plugin named Jstree is exploited as a visualization tool to display personal data. A …
… Jquery plugin named Jstree is exploited as a visualization tool to display personal data. A …
Detecting user behavior in cyber threat intelligence: Development of Honeypsy system
… Our Honeypsy system is composed of a Big-5 personality test, a cyber expertise test, and a
… to examining unknown cyber threats. We use SPLUNK to monitor and visualize the honeypot …
… to examining unknown cyber threats. We use SPLUNK to monitor and visualize the honeypot …
Research on Cyber ISR Visualization Method Based on BGP Archive Data through Hacking Case Analysis of North Korean Cyber-Attack Groups
… cyber-attack groups for cyber ISR battlefield visualization. … visualization of the cyber ISR
battlefield based on the BGP archive data. Through this, we propose a method to visualize cyber …
battlefield based on the BGP archive data. Through this, we propose a method to visualize cyber …
Archetype-based modeling of persona for comprehensive personality computing from personal big data
… into automatic personality computing. However, the integrity and accuracy of the results from
current automatic personality computing is insufficient for the elaborate modeling in Cyber-I …
current automatic personality computing is insufficient for the elaborate modeling in Cyber-I …