default search action
ISI 2017: Beijing, China
- 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017. IEEE 2017, ISBN 978-1-5090-6727-5
- Canchu Lin, Jenell L. S. Wittmer:
Proactive information security behavior and individual creativity: Effects of group culture and decentralized IT governance. 1-6 - Mehdi Yousefi, Nhamo Mtetwa, Yan Zhang, Huaglory Tianfield:
A novel approach for analysis of attack graph. 7-12 - John Grisham, Sagar Samtani, Mark W. Patton, Hsinchun Chen:
Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence. 13-18 - Xiaohui Han, Lianhai Wang, Shujiang Xu, Guangqi Liu, Dawei Zhao:
Linking social network accounts by modeling user spatiotemporal habits. 19-24 - Josephine K. Chow, Xiangyang Li, Xenia Mountrouidou:
Raising flags: Detecting covert storage channels using relative entropy. 25-30 - Christopher Schon, Niall M. Adams, Marina Evangelou:
Clustering and monitoring edge behaviour in enterprise network traffic. 31-36 - Ze Li, Duoyong Sun, Kun Cai, Bo Li:
Tie strength still matters: Investigating interaction patterns of Al-Qaeda network in terror operations. 37-42 - Wei Wang, Ming Zhu, Jinlin Wang, Xuewen Zeng, Zhongzhen Yang:
End-to-end encrypted traffic classification with one-dimensional convolution neural networks. 43-48 - Zihao Liu, Bin Zhang, Ning Zhu, Lixun Li:
Hierarchical network threat situation assessment method for DDoS based on D-S evidence theory. 49-53 - Yasmeen Alufaisan, Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham:
Hacking social network data mining. 54-59 - Tuomo Hiippala:
Recognizing military vehicles in social media images using deep learning. 60-65 - Ravi Barreira, Vládia Pinheiro, Vasco Furtado:
A framework for digital forensics analysis based on semantic role labeling. 66-71 - Neda Abdelhamid, Fadi A. Thabtah, Hussein Abdel-jaber:
Phishing detection: A recent intelligent machine learning comparison based on models content and features. 72-77 - Yen-Lung Lai, Bok-Min Goi, Tong-Yuen Chai:
Alignment-free indexing-first-one hashing with bloom filter integration. 78-82 - Malaka El, Emma McMahon, Sagar Samtani, Mark W. Patton, Hsinchun Chen:
Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments. 83-88 - Sonya H. Y. Hsu, Steven J. Dick:
Information sharing & cyber threats. 89-94 - Chiyu Cai, Linjing Li, Daniel Zeng:
Web-derived Emotional Word Detection in social media using Latent Semantic information. 95-100 - Saike He, Xiaolong Zheng, Daniel Zeng:
The dynamics of health sentiments with competitive interactions in social media. 101-106 - Sreyasee Das Bhattacharjee, Ashit Talukder, Ehab Al-Shaer, Pratik Doshi:
Prioritized active learning for malicious URL detection using weighted text-based features. 107-112 - Song Sun, Qiudan Li, Peng Yan, Daniel Dajun Zeng:
Mapping users across social media platforms by integrating text and structure information. 113-118 - Yuhao Zhang, Wenji Mao, Daniel Zeng:
Topic evolution modeling in social media short texts based on recurrent semantic dependent CRP. 119-124 - Carlos Caminha, Vasco Furtado:
Impact of human mobility on police allocation. 125-127 - Chiyu Cai, Linjing Li, Daniel Zeng:
Behavior enhanced deep bot detection in social media. 128-130 - Junjie Lin, Wenji Mao, Daniel Zeng:
Topic and user based refinement for competitive perspective identification. 131-133 - Xiangfei Kong, Wenji Mao:
Ranking events based on user relevant query. 134-136 - Hongyuan Ma, Ou Tao, Chunlu Zhao, Pengxiao Li, Lihong Wang:
Impact of replacement policies on static-dynamic query results cache in web search engines. 137-139 - Hongliang Liang, Yan Song, Da Xiao:
An end-to-end model for Android malware detection. 140-142 - Zhichao Cheng, Fanping Zeng, Xingqiu Zhong, Mingsong Zhou, Chengcheng Lv, Shuli Guo:
Resolving reflection methods in Android applications. 143-145 - Qian Li, Xiu-cun Wang:
The impact of different perceived support dimensions of mobile media APP users on customer commitment and customer recommendation. 146-148 - Aaron Zimba, Zhaoshun Wang, Hongsong Chen:
Reasoning crypto ransomware infection vectors with Bayesian networks. 149-151 - Nan Xu:
Analyzing multimodal public sentiment based on hierarchical semantic attentional network. 152-154 - Wangyan Feng, Wenfeng Yan, Shuning Wu, Ningwei Liu:
Wavelet transform and unsupervised machine learning to detect insider threat on cloud file-sharing. 155-157 - Hsin-Hsiung Huang, Zijing Wang, Wingyan Chung:
Efficient parameter selection for SVM: The case of business intelligence categorization. 158-160 - Guandan Chen, Qingchao Kong, Wenji Mao:
An attention-based neural popularity prediction model for social media events. 161-163 - Wingyan Chung:
Developing curricular modules for cybersecurity informatics: An active learning approach. 164-166 - Jie Bai, Linjing Li, Lan Lu, Yanwu Yang, Daniel Zeng:
Real-time prediction of meme burst. 167-169 - Aaron Zimba, Zhaoshun Wang:
On Man-In-The-Cloud (MITC) attacks: The analytical case of Linux. 170-172 - Charles Feng, Shuning Wu, Ningwei Liu:
A user-centric machine learning framework for cyber security operations center. 173-175 - Emma McMahon, Ryan Williams, Malaka El, Sagar Samtani, Mark W. Patton, Hsinchun Chen:
Assessing medical device vulnerabilities on the Internet of Things. 176-178 - Ryan Williams, Emma McMahon, Sagar Samtani, Mark W. Patton, Hsinchun Chen:
Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach. 179-181 - Guandan Chen, Qingchao Kong, Wenji Mao:
Online event detection and tracking in social media based on neural similarity metric learning. 182-184 - Rodney R. Rohrmann, Vincent J. Ercolani, Mark W. Patton:
Large scale port scanning through tor using parallel Nmap scans to scan large portions of the IPv4 range. 185-187 - Dmitry Devyatkin, Ivan V. Smirnov, Ananyeva Margarita, Maria Kobozeva, Chepovskiy Andrey, Solovyev Fyodor:
Exploring linguistic features for extremist texts detection (on the material of Russian-speaking illegal texts). 188-190 - Wingyan Chung, Elizabeth Mustaine, Daniel Zeng:
Criminal intelligence surveillance and monitoring on social media: Cases of cyber-trafficking. 191-193 - Saike He, Xiaolong Zheng, Daniel Zeng:
Modeling online collective emotions through knowledge transfer. 194-196 - Peng Su, Yuqin Zhao, Jian Yang, Zhenpeng Li:
A new approach to security informatics: Actionable behavioral rules mining (ABRM). 197 - Beibei Tian, Feifei Zheng, Yuqi Cao:
Research on the relationship between informatization level and global competitiveness. 198 - Linpeng Chai, Bin Zhang:
An identity-based one-off public key scheme for privacy preservation. 199 - Su Hou, Tianliang Lu, Yanhui Du, Jing Guo:
Static detection of Android malware based on improved random forest algorithm. 200 - Jin-Seong Kim, Im Young Jung:
Android app protection using same identifier attack defensor. 201 - Lu Luo, Peng Cao, Dazhong Mu:
Research on high-resolution imaging technology to extract the halftone-dot-information by iPhone. 202 - Pengshuai Cui, Peidong Zhu, Peng Xun, Zhuoqun Xia:
Enhance the robustness of cyber-physical systems by adding interdependency. 203 - C. Y. Tseung, Kam-Pui Chow, X. Zhang:
Extended abstract: Anti-DDoS technique using self-learning bloom filter. 204 - Keyi Li, Yang Li, Jianyi Liu, Ru Zhang, Xi Duan:
Attack pattern mining algorithm based on security log. 205
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.