default search action
ISI 2016: Tucson, AZ, USA
- IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016. IEEE 2016, ISBN 978-1-5090-3865-7
Cybersecurity Analytics and Threat Intelligence
- Robert Newman, Pat Doody
, Mira Trebar, Uchenna Okoke:
Rights management to enable a true Internet of Things. 1-6 - Eric Nunes, Ahmad Diab, Andrew T. Gunn, Ericsson Marin, Vineet Mishra, Vivin Paliath, John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian:
Darknet and deepnet mining for proactive cybersecurity threat intelligence. 7-12 - Zhen Fang, Xinyi Zhao, Qiang Wei, Guoqing Chen, Yong Zhang, Chunxiao Xing
, Weifeng Li
, Hsinchun Chen:
Exploring key hackers and cybersecurity threats in Chinese hacker communities. 13-18 - Sagar Samtani
, Kory Chinn, Cathy Larson, Hsinchun Chen:
AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis. 19-24 - Sagar Samtani
, Shuo Yu, Hongyi Zhu
, Mark W. Patton, Hsinchun Chen:
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques. 25-30 - David G. Dobolyi
, Ahmed Abbasi
:
PhishMonger: A free and open source public archive of real-world phishing websites. 31-36 - Joel Brynielsson, Ulrik Franke, Muhammad Adnan Tariq, Stefan Varga:
Using cyber defense exercises to obtain additional data for attacker profiling. 37-42 - Travis Floyd, Matthew Grieco, Edna F. Reid:
Mining hospital data breach records: Cyber threats to U.S. hospitals. 43-48
Data Science and Analytics in Security Informatics
- Justin Sahs:
Bayesian nonparametric relational learning with the broken tree process. 49-54 - Jie Bai, Linjing Li, Daniel Zeng:
Activating topic models from a cognitive perspective. 55-60 - Saike He, Xiaolong Zheng, Jiaojiao Wang, Zhijun Chang, Yin Luo, Daniel Zeng:
Meme extraction and tracing in crisis events. 61-66 - Marina Evangelou
, Niall M. Adams:
Predictability of NetFlow data. 67-72 - E. Allison Newcomb, Robert J. Hammell, Steve E. Hutchinson:
Effective prioritization of network intrusion alerts to enhance situational awareness. 73-78 - Jennifer Jie Xu, Dongyu Chen, Michael Chau
:
Identifying features for detecting fraudulent loan requests on P2P platforms. 79-84 - Leo Figea, Lisa Kaati, Ryan Scrivens
:
Measuring online affects in a white supremacy forum. 85-90 - Silvia Metelli
, Nicholas A. Heard:
Model-based clustering and new edge modelling in large computer networks. 91-96 - Kangzhi Zhao, Yong Zhang, Chunxiao Xing
, Weifeng Li
, Hsinchun Chen:
Chinese underground market jargon analysis based on unsupervised learning. 97-102 - Khudran Alzhrani
, Ethan M. Rudd, Terrance E. Boult, C. Edward Chow:
Automated big text security classification. 103-108 - Ahmed T. Zulkarnine, Richard Frank, Bryan Monk, Julianna Mitchell, Garth Davies:
Surfacing collaborated networks in dark web to find illicit and criminal content. 109-114 - Boshra Nabaei, Martin Ester:
Activity monitoring using topic models. 115-120 - Lisa Kaati, Amendra Shrestha, Katie Cohen, Sinna Lindquist:
Automatic detection of xenophobic narratives: A case study on Swedish alternative media. 121-126 - Jiaojiao Wang, Saike He, Yiyuan Xu, Zhidong Cao, Lei Wang, Daniel Dajun Zeng:
Spatial-temporal patterns and drivers of illicit tobacco trade in Changsha county, China. 127-132 - Hamidreza Alvari, Paulo Shakarian, J. E. Kelly Snyder:
A non-parametric learning approach to identify online human trafficking. 133-138 - Mohiuddin Solaimani, Sayeed Salam, Ahmad M. Mustafa, Latifur Khan
, Patrick T. Brandt, Bhavani Thuraisingham:
Near real-time atrocity event coding. 139-144 - Shin-Ying Huang, Hsinchun Chen:
Exploring the online underground marketplaces through topic-based social network and clustering. 145-150 - Nasser Alsadhan, David B. Skillicorn
:
Discovering structure in Islamist postings using systemic nets. 151-156 - Xiaohui Han, Lianhai Wang, Lijuan Xu, Shuihui Zhang:
Social Media account linkage using user-generated geo-location data. 157-162
Human Behavior and Factors in Security Applications
- Steven John Simon:
Trust and distrust as distinct constructs: Evidence from data theft environments. 163-168 - Ahmed Abbasi
, F. Mariam Zahedi, Yan Chen
:
Phishing susceptibility: The good, the bad, and the ugly. 169-174
Organizational, National, and International Issues in Counter-Terrorism and Other Security Applications
- Ze Li, Duoyong Sun, Hsinchun Chen, Shin-Ying Huang:
Identifying the socio-spatial dynamics of terrorist attacks in the Middle East. 175-180 - Sumeet Kumar
, Matthew Benigni, Kathleen M. Carley:
The impact of US cyber policies on cyber-attacks trend. 181-186
Short Papers
Cybersecurity Analytics and Threat Intelligence
- Ericsson Marin, Ahmad Diab, Paulo Shakarian:
Product offerings in malicious hacker markets. 187-189 - Nick Heard, Konstantina Palla, Maria Skoularidou:
Topic modelling of authentication events in an enterprise computer network. 190-192 - Vincent J. Ercolani, Mark W. Patton, Hsinchun Chen:
Shodan visualized. 193-195 - Arthur Jicha, Mark W. Patton, Hsinchun Chen:
SCADA honeypots: An in-depth analysis of Conpot. 196-198 - Ryan Jicha, Mark W. Patton, Hsinchun Chen:
Identifying devices across the IPv4 address space. 199-201
Data Science and Analytics in Security Informatics
- Chiyu Cai, Linjing Li, Daniel Zeng:
New words enlightened sentiment analysis in social media. 202-204 - Victor A. Benjamin, Hsinchun Chen:
Identifying language groups within multilingual cybercriminal forums. 205-207 - Melissa J. Turcotte, Juston S. Moore, Nick Heard, Aaron McPhall:
Poisson factorization for peer-based anomaly detection. 208-210 - Jie Bai, Linjing Li, Daniel Zeng, Junjie Lin:
Social role clustering with topic model. 211-213 - Junjie Lin, Wenji Mao, Daniel Zeng:
Competitive perspective identification via topic based refinement for online documents. 214-216 - Rodney Rohrmann, Mark W. Patton, Hsinchun Chen:
Anonymous port scanning: Performing network reconnaissance through Tor. 217
Poster Papers
- Sumeet Kumar
, Kathleen M. Carley:
DDoS cyber-attacks network: Who's attacking whom. 218 - John Grisham, Calvin Barreras, Cyran Afarin, Mark W. Patton, Hsinchun Chen:
Identifying top listers in Alphabay using Latent Dirichlet Allocation. 219
Workshop Papers
Big Data Analytics for Cybersecurity Computing
- Nick Heard, Patrick Rubin-Delanchy:
Network-wide anomaly detection via the Dirichlet process. 220-224 - Hamid Reza Naji, Najmeh Rezaee:
Parallel Massive Data Monitoring and Processing Using Sensor Networks. 225-230 - Sumeet Kumar
, Kathleen M. Carley:
Understanding DDoS cyber-attacks using social media analytics. 231-236 - Jesus Pacheco
, Shalaka Satam, Salim Hariri, Clarisa Grijalva, Helena Berkenbrock:
IoT Security Development Framework for building trustworthy Smart car services. 237-242 - Patrick Rubin-Delanchy, Niall M. Adams, Nicholas A. Heard:
Disassortativity of computer networks. 243-247 - Mark Whitehouse, Marina Evangelou
, Niall M. Adams:
Activity-based temporal anomaly detection in enterprise-cyber security. 248-250
Cybersecurity Education & Workforce
- Shiva Azadegan, Michael O'Leary:
An undergraduate Cyber Operations curriculum in the making: A 10+ year report. 251-254 - Xiang Michelle Liu, Diane R. Murphy:
Engaging females in cybersecurity: K through Gray. 255-260 - Sagar Raina, Leon Bernard, Blair Taylor, Siddharth Kaza:
Using eye-tracking to investigate content skipping: A study on learning modules in cybersecurity. 261-266 - Vandana P. Janeja, Carolyn B. Seaman, Kerrie Kephart, Aryya Gangopadhyay, Amy Everhart:
Cybersecurity workforce development: A peer mentoring approach. 267-272 - Wei Wei, Arti Mann, Kewei Sha
, T. Andrew Yang:
Design and implementation of a multi-facet hierarchical cybersecurity education framework. 273-278 - Nikitha Kommera, Faisal Kaleem, Syed Mubashir Shah Harooni:
Smart augmented reality glasses in cybersecurity and forensic education. 279-281 - Brian Ledbetter, Zach Wallace, Adam Harms, Ambareen Siraj, Laurin Buchanan:
CySCom: Cybersecurity COMics. 282-284 - Shiva Azadegan, Josh Dehlinger, Siddharth Kaza, Blair Taylor, Wei Yu
:
Challenges, lessons learned and results from establishing a CyberCorps: Scholarship for Service program targeting undergraduate students. 285
Women in Cybersecurity
- Leslie C. Milton, Atif Memon:
Intruder detector: A continuous authentication tool to model user behavior. 286-291 - Manjari Jha, Raj Acharya:
An immune inspired unsupervised intrusion detection system for detection of novel attacks. 292-297 - Rima Asmar Awad
, Kirk D. Sayre:
Automatic clustering of malware variants. 298-303
Doctoral Consortium
- Andrii Shalaginov:
Soft Computing and Hybrid Intelligence for Decision Support in Forensics Science. 304-306 - Sumeet Kumar
, Kathleen M. Carley:
Approaches to understanding the motivations behind cyber attacks. 307-309 - Brandon W. Jones, Wingyan Chung:
Topic modeling of small sequential documents: Proposed experiments for detecting terror attacks. 310-312 - Benjamin W. K. Hung, Anura P. Jayasumana, Vidarshana W. Bandara:
Detecting radicalization trajectories using graph pattern matching algorithms. 313-315 - Vivin Paliath, Paulo Shakarian:
Modeling cyber-attacks on industrial control systems. 316-318 - Sagar Samtani
, Hsinchun Chen:
Using social network analysis to identify key hackers for keylogging tools in hacker forums. 319-321 - Weifeng Li
, Junming Yin, Hsinchun Chen:
Targeting key data breach services in underground supply chain. 322-324
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.