Abstract is missing.
- Proactive information security behavior and individual creativity: Effects of group culture and decentralized IT governanceCanchu Lin, Jenell L. S. Wittmer. 1-6 [doi]
- A novel approach for analysis of attack graphMehdi Yousefi, Nhamo Mtetwa, Yan Zhang, Huaglory Tianfield. 7-12 [doi]
- Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligenceJohn Grisham, Sagar Samtani, Mark W. Patton, Hsinchun Chen. 13-18 [doi]
- Linking social network accounts by modeling user spatiotemporal habitsXiaohui Han, Lianhai Wang, Shujiang Xu, Guangqi Liu, Dawei Zhao. 19-24 [doi]
- Raising flags: Detecting covert storage channels using relative entropyJosephine K. Chow, Xiangyang Li, Xenia Mountrouidou. 25-30 [doi]
- Clustering and monitoring edge behaviour in enterprise network trafficChristopher Schon, Niall M. Adams, Marina Evangelou. 31-36 [doi]
- Tie strength still matters: Investigating interaction patterns of Al-Qaeda network in terror operationsZe Li, Duoyong Sun, Kun Cai, Bo Li. 37-42 [doi]
- End-to-end encrypted traffic classification with one-dimensional convolution neural networksWei Wang, Ming Zhu, Jinlin Wang, Xuewen Zeng, Zhongzhen Yang. 43-48 [doi]
- Hierarchical network threat situation assessment method for DDoS based on D-S evidence theoryZihao Liu, Bin Zhang, Ning Zhu, Lixun Li. 49-53 [doi]
- Hacking social network data miningYasmeen Alufaisan, Yan Zhou, Murat Kantarcioglu, Bhavani M. Thuraisingham. 54-59 [doi]
- Recognizing military vehicles in social media images using deep learningTuomo Hiippala. 60-65 [doi]
- A framework for digital forensics analysis based on semantic role labelingRavi Barreira, Vládia Pinheiro, Vasco Furtado. 66-71 [doi]
- Phishing detection: A recent intelligent machine learning comparison based on models content and featuresNeda Abdelhamid, Fadi A. Thabtah, Hussein Abdel-jaber. 72-77 [doi]
- Alignment-free indexing-first-one hashing with bloom filter integrationYen-Lung Lai, Bok-Min Goi, Tong-Yuen Chai. 78-82 [doi]
- Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instrumentsMalaka El, Emma McMahon, Sagar Samtani, Mark W. Patton, Hsinchun Chen. 83-88 [doi]
- Information sharing & cyber threatsSonya H. Y. Hsu, Steven J. Dick. 89-94 [doi]
- Web-derived Emotional Word Detection in social media using Latent Semantic informationChiyu Cai, Linjing Li, Daniel Zeng. 95-100 [doi]
- The dynamics of health sentiments with competitive interactions in social mediaSaike He, Xiaolong Zheng, Daniel Zeng. 101-106 [doi]
- Prioritized active learning for malicious URL detection using weighted text-based featuresSreyasee Das Bhattacharjee, Ashit Talukder, Ehab Al-Shaer, Pratik Doshi. 107-112 [doi]
- Mapping users across social media platforms by integrating text and structure informationSong Sun, Qiudan Li, Peng Yan, Daniel Dajun Zeng. 113-118 [doi]
- Topic evolution modeling in social media short texts based on recurrent semantic dependent CRPYuhao Zhang, Wenji Mao, Daniel Zeng. 119-124 [doi]
- Impact of human mobility on police allocationCarlos Caminha, Vasco Furtado. 125-127 [doi]
- Behavior enhanced deep bot detection in social mediaChiyu Cai, Linjing Li, Daniel Zeng. 128-130 [doi]
- Topic and user based refinement for competitive perspective identificationJunjie Lin, Wenji Mao, Daniel Zeng. 131-133 [doi]
- Ranking events based on user relevant queryXiangfei Kong, Wenji Mao. 134-136 [doi]
- Impact of replacement policies on static-dynamic query results cache in web search enginesHongyuan Ma, Ou Tao, Chunlu Zhao, Pengxiao Li, Lihong Wang. 137-139 [doi]
- An end-to-end model for Android malware detectionHongliang Liang, Yan Song, Da Xiao. 140-142 [doi]
- Resolving reflection methods in Android applicationsZhichao Cheng, Fanping Zeng, Xingqiu Zhong, Mingsong Zhou, Chengcheng Lv, Shuli Guo. 143-145 [doi]
- The impact of different perceived support dimensions of mobile media APP users on customer commitment and customer recommendationQian Li, Xiu-cun Wang. 146-148 [doi]
- Reasoning crypto ransomware infection vectors with Bayesian networksAaron Zimba, ZhaoShun Wang, Hongsong Chen. 149-151 [doi]
- Analyzing multimodal public sentiment based on hierarchical semantic attentional networkNan Xu. 152-154 [doi]
- Wavelet transform and unsupervised machine learning to detect insider threat on cloud file-sharingWangyan Feng, Wenfeng Yan, Shuning Wu, Ningwei Liu. 155-157 [doi]
- Efficient parameter selection for SVM: The case of business intelligence categorizationHsin-Hsiung Huang, Zijing Wang, Wingyan Chung. 158-160 [doi]
- An attention-based neural popularity prediction model for social media eventsGuandan Chen, Qingchao Kong, Wenji Mao. 161-163 [doi]
- Developing curricular modules for cybersecurity informatics: An active learning approachWingyan Chung. 164-166 [doi]
- Real-time prediction of meme burstJie Bai, Linjing Li, Lan Lu, Yanwu Yang, Daniel Zeng. 167-169 [doi]
- On Man-In-The-Cloud (MITC) attacks: The analytical case of LinuxAaron Zimba, ZhaoShun Wang. 170-172 [doi]
- A user-centric machine learning framework for cyber security operations centerCharles Feng, Shuning Wu, Ningwei Liu. 173-175 [doi]
- Assessing medical device vulnerabilities on the Internet of ThingsEmma McMahon, Ryan Williams, Malaka El, Sagar Samtani, Mark W. Patton, Hsinchun Chen. 176-178 [doi]
- Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approachRyan Williams, Emma McMahon, Sagar Samtani, Mark W. Patton, Hsinchun Chen. 179-181 [doi]
- Online event detection and tracking in social media based on neural similarity metric learningGuandan Chen, Qingchao Kong, Wenji Mao. 182-184 [doi]
- Large scale port scanning through tor using parallel Nmap scans to scan large portions of the IPv4 rangeRodney R. Rohrmann, Vincent J. Ercolani, Mark W. Patton. 185-187 [doi]
- Exploring linguistic features for extremist texts detection (on the material of Russian-speaking illegal texts)Dmitry Devyatkin, Ivan Smirnov, Ananyeva Margarita, Kobozeva Maria, Chepovskiy Andrey, Solovyev Fyodor. 188-190 [doi]
- Criminal intelligence surveillance and monitoring on social media: Cases of cyber-traffickingWingyan Chung, Elizabeth Mustaine, Daniel Zeng. 191-193 [doi]
- Modeling online collective emotions through knowledge transferSaike He, Xiaolong Zheng, Daniel Zeng. 194-196 [doi]
- A new approach to security informatics: Actionable behavioral rules mining (ABRM)Peng Su, Yuqin Zhao, Jian Yang, Zhenpeng Li. 197 [doi]
- Research on the relationship between informatization level and global competitivenessBeibei Tian, Feifei Zheng, Yuqi Cao. 198 [doi]
- An identity-based one-off public key scheme for privacy preservationLinpeng Chai, Bin Zhang. 199 [doi]
- Static detection of Android malware based on improved random forest algorithmSu Hou, Tianliang Lu, Yanhui Du, Jing Guo. 200 [doi]
- Android app protection using same identifier attack defensorJin-Seong Kim, Im Y. Jung. 201 [doi]
- Research on high-resolution imaging technology to extract the halftone-dot-information by iPhoneLu Luo, Peng Cao, Dazhong Mu. 202 [doi]
- Enhance the robustness of cyber-physical systems by adding interdependencyPengshuai Cui, Peidong Zhu, Peng Xun, Zhuoqun Xia. 203 [doi]
- Extended abstract: Anti-DDoS technique using self-learning bloom filterC. Y. Tseung, K. P. Chow, X. Zhang. 204 [doi]
- Attack pattern mining algorithm based on security logKeyi Li, Yang Li, Jianyi Liu, Ru Zhang, Xi Duan. 205 [doi]