Abstract is missing.
- Rights management to enable a true Internet of ThingsRobert Newman, Pat Doody, Mira Trebar, Uchenna Okoke. 1-6 [doi]
- Darknet and deepnet mining for proactive cybersecurity threat intelligenceEric Nunes, Ahmad Diab, Andrew T. Gunn, Ericsson Marin, Vineet Mishra, Vivin Paliath, John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian. 7-12 [doi]
- Exploring key hackers and cybersecurity threats in Chinese hacker communitiesZhen Fang, Xinyi Zhao, Qiang Wei, Guoqing Chen, Yong Zhang, Chunxiao Xing, Weifeng Li, Hsinchun Chen. 13-18 [doi]
- AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysisSagar Samtani, Kory Chinn, Cathy Larson, Hsinchun Chen. 19-24 [doi]
- Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniquesSagar Samtani, Shuo Yu, Hongyi Zhu, Mark W. Patton, Hsinchun Chen. 25-30 [doi]
- PhishMonger: A free and open source public archive of real-world phishing websitesDavid G. Dobolyi, Ahmed Abbasi. 31-36 [doi]
- Using cyber defense exercises to obtain additional data for attacker profilingJoel Brynielsson, Ulrik Franke, Muhammad Adnan Tariq, Stefan Varga. 37-42 [doi]
- Mining hospital data breach records: Cyber threats to U.S. hospitalsTravis Floyd, Matthew Grieco, Edna F. Reid. 43-48 [doi]
- Bayesian nonparametric relational learning with the broken tree processJustin Sahs. 49-54 [doi]
- Activating topic models from a cognitive perspectiveJie Bai, Linjing Li, Daniel Zeng. 55-60 [doi]
- Meme extraction and tracing in crisis eventsSaike He, Xiaolong Zheng, Jiaojiao Wang, Zhijun Chang, Yin Luo, Daniel Zeng. 61-66 [doi]
- Predictability of NetFlow dataMarina Evangelou, Niall M. Adams. 67-72 [doi]
- Effective prioritization of network intrusion alerts to enhance situational awarenessE. Allison Newcomb, Robert J. Hammell II, Steve Hutchinson. 73-78 [doi]
- Identifying features for detecting fraudulent loan requests on P2P platformsJennifer Jie Xu, Dongyu Chen, Michael Chau. 79-84 [doi]
- Measuring online affects in a white supremacy forumLeo Figea, Lisa Kaati, Ryan Scrivens. 85-90 [doi]
- Model-based clustering and new edge modelling in large computer networksSilvia Metelli, Nicholas Heard. 91-96 [doi]
- Chinese underground market jargon analysis based on unsupervised learningKangzhi Zhao, Yong Zhang, Chunxiao Xing, Weifeng Li, Hsinchun Chen. 97-102 [doi]
- Automated big text security classificationKhudran Alzhrani, Ethan M. Rudd, Terrance E. Boult, C. Edward Chow. 103-108 [doi]
- Surfacing collaborated networks in dark web to find illicit and criminal contentAhmed T. Zulkarnine, Richard Frank, Bryan Monk, Julianna Mitchell, Garth Davies. 109-114 [doi]
- Activity monitoring using topic modelsBoshra Nabaei, Martin Ester. 115-120 [doi]
- Automatic detection of xenophobic narratives: A case study on Swedish alternative mediaLisa Kaati, Amendra Shrestha, Katie Cohen, Sinna Lindquist. 121-126 [doi]
- Spatial-temporal patterns and drivers of illicit tobacco trade in Changsha county, ChinaJiaojiao Wang, Saike He, Yiyuan Xu, Zhidong Cao, Lei Wang, Daniel Dajun Zeng. 127-132 [doi]
- A non-parametric learning approach to identify online human traffickingHamidreza Alvari, Paulo Shakarian, J. E. Kelly Snyder. 133-138 [doi]
- Near real-time atrocity event codingMohiuddin Solaimani, Sayeed Salam, Ahmad M. Mustafa, Latifur Khan, Patrick T. Brandt, Bhavani M. Thuraisingham. 139-144 [doi]
- Exploring the online underground marketplaces through topic-based social network and clusteringShin-Ying Huang, Hsinchun Chen. 145-150 [doi]
- Discovering structure in Islamist postings using systemic netsN. Alsadhan, David B. Skillicorn. 151-156 [doi]
- Social Media account linkage using user-generated geo-location dataXiaohui Han, Lianhai Wang, Lijuan Xu, Shuihui Zhang. 157-162 [doi]
- Trust and distrust as distinct constructs: Evidence from data theft environmentsSteven J. Simon. 163-168 [doi]
- Phishing susceptibility: The good, the bad, and the uglyAhmed Abbasi, F. Mariam Zahedi, Yan Chen. 169-174 [doi]
- Identifying the socio-spatial dynamics of terrorist attacks in the Middle EastZe Li, Duoyong Sun, Hsinchun Chen, Shin-Ying Huang. 175-180 [doi]
- The impact of US cyber policies on cyber-attacks trendSumeet Kumar, Matthew Benigni, Kathleen M. Carley. 181-186 [doi]
- Product offerings in malicious hacker marketsEricsson Marin, Ahmad Diab, Paulo Shakarian. 187-189 [doi]
- Topic modelling of authentication events in an enterprise computer networkNick Heard, Konstantina Palla, Maria Skoularidou. 190-192 [doi]
- Shodan visualizedVincent J. Ercolani, Mark W. Patton, Hsinchun Chen. 193-195 [doi]
- SCADA honeypots: An in-depth analysis of ConpotArthur Jicha, Mark W. Patton, Hsinchun Chen. 196-198 [doi]
- Identifying devices across the IPv4 address spaceRyan Jicha, Mark W. Patton, Hsinchun Chen. 199-201 [doi]
- New words enlightened sentiment analysis in social mediaChiyu Cai, Linjing Li, Daniel Zeng. 202-204 [doi]
- Identifying language groups within multilingual cybercriminal forumsVictor A. Benjamin, Hsinchun Chen. 205-207 [doi]
- Poisson factorization for peer-based anomaly detectionMelissa J. Turcotte, Juston Moore, Nick Heard, Aaron McPhall. 208-210 [doi]
- Social role clustering with topic modelJie Bai, Linjing Li, Daniel Zeng, Junjie Lin. 211-213 [doi]
- Competitive perspective identification via topic based refinement for online documentsJunjie Lin, Wenji Mao, Daniel Zeng. 214-216 [doi]
- Anonymous port scanning: Performing network reconnaissance through TorRodney Rohrmann, Mark W. Patton, Hsinchun Chen. 217 [doi]
- DDoS cyber-attacks network: Who's attacking whomSumeet Kumar, Kathleen M. Carley. 218 [doi]
- Identifying top listers in Alphabay using Latent Dirichlet AllocationJohn Grisham, Calvin Barreras, Cyran Afarin, Mark W. Patton, Hsinchun Chen. 219 [doi]
- Network-wide anomaly detection via the Dirichlet processNick Heard, Patrick Rubin-Delanchy. 220-224 [doi]
- Parallel Massive Data Monitoring and Processing Using Sensor NetworksHamid Reza Naji, Najmeh Rezaee. 225-230 [doi]
- Understanding DDoS cyber-attacks using social media analyticsSumeet Kumar, Kathleen M. Carley. 231-236 [doi]
- IoT Security Development Framework for building trustworthy Smart car servicesJesus Pacheco, Shalaka Satam, Salim Hariri, Clarisa Grijalva, Helena Berkenbrock. 237-242 [doi]
- Disassortativity of computer networksPatrick Rubin-Delanchy, Niall M. Adams, Nicholas A. Heard. 243-247 [doi]
- Activity-based temporal anomaly detection in enterprise-cyber securityMark Whitehouse, Marina Evangelou, Niall M. Adams. 248-250 [doi]
- + year reportShiva Azadegan, Michael O'Leary. 251-254 [doi]
- Engaging females in cybersecurity: K through GrayXiang Liu, Diane Murphy. 255-260 [doi]
- Using eye-tracking to investigate content skipping: A study on learning modules in cybersecuritySagar Raina, Leon Bernard, Blair Taylor, Siddharth Kaza. 261-266 [doi]
- Cybersecurity workforce development: A peer mentoring approachVandana P. Janeja, Carolyn Seaman, Kerrie Kephart, Aryya Gangopadhyay, Amy Everhart. 267-272 [doi]
- Design and implementation of a multi-facet hierarchical cybersecurity education frameworkWei Wei, Arti Mann, Kewei Sha, T. Andrew Yang. 273-278 [doi]
- Smart augmented reality glasses in cybersecurity and forensic educationNikitha Kommera, Faisal Kaleem, Syed Mubashir Shah Harooni. 279-281 [doi]
- CySCom: Cybersecurity COMicsBrian Ledbetter, Zach Wallace, Adam Harms, Ambareen Siraj, Laurin Buchanan. 282-284 [doi]
- Challenges, lessons learned and results from establishing a CyberCorps: Scholarship for Service program targeting undergraduate studentsShiva Azadegan, Josh Dehlinger, Siddharth Kaza, Blair Taylor, Wei Yu 0002. 285 [doi]
- Intruder detector: A continuous authentication tool to model user behaviorLeslie C. Milton, Atif Memon. 286-291 [doi]
- An immune inspired unsupervised intrusion detection system for detection of novel attacksManjari Jha, Raj Acharya. 292-297 [doi]
- Automatic clustering of malware variantsRima Asmar Awad, Kirk D. Sayre. 298-303 [doi]
- Soft Computing and Hybrid Intelligence for Decision Support in Forensics ScienceAndrii Shalaginov. 304-306 [doi]
- Approaches to understanding the motivations behind cyber attacksSumeet Kumar, Kathleen M. Carley. 307-309 [doi]
- Topic modeling of small sequential documents: Proposed experiments for detecting terror attacksBrandon W. Jones, Wingyan Chung. 310-312 [doi]
- Detecting radicalization trajectories using graph pattern matching algorithmsBenjamin W. K. Hung, Anura P. Jayasumana, Vidarshana W. Bandara. 313-315 [doi]
- Modeling cyber-attacks on industrial control systemsVivin Paliath, Paulo Shakarian. 316-318 [doi]
- Using social network analysis to identify key hackers for keylogging tools in hacker forumsSagar Samtani, Hsinchun Chen. 319-321 [doi]
- Targeting key data breach services in underground supply chainWeifeng Li, Junming Yin, Hsinchun Chen. 322-324 [doi]