Abstract is missing.
- Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat IntelligenceGhaith Husari, Xi Niu, Bill Chu, Ehab Al-Shaer. 1-6 [doi]
- Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug ReportsLorenzo Neil, Sudip Mittal, Anupam Joshi. 7-12 [doi]
- Spatial Patterns of Offender GroupsMohammad A. Tayebi, Hamed Yaghoubi Shahir, Uwe Glässer, Patricia L. Brantingham. 13-18 [doi]
- Adaptive Anomaly Detection on Network Data StreamsElizabeth Riddle-Workman, Marina Evangelou, Niall M. Adams. 19-24 [doi]
- Cyber Resilience Framework for Industrial Control Systems: Concepts, Metrics, and InsightsMd Ariful Haque, Gael Kamdem De Teyou, Sachin Shetty, Bheshaj Krishnappa. 25-30 [doi]
- DARKMENTION: A Deployed System to Predict Enterprise-Targeted External CyberattacksMohammed Almukaynizi, Ericsson Marin, Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Dipsy Kapoor, Timothy Siedlecki. 31-36 [doi]
- A Study of Data Fusion for Predicting Novel Activity in Enterprise Cyber-SecurityJack Hogan, Niall M. Adams. 37-42 [doi]
- Correlation-based Dynamics and Systemic Risk Measures in the Cryptocurrency MarketJiaqi Liang, Linjing Li, Daniel Zeng, Yunwei Zhao. 43-48 [doi]
- Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion AlertsStephen Moskal, Shanchieh Jay Yang, Michael E. Kuhl. 49-54 [doi]
- Attacklets: Modeling High Dimensionality in Real World CyberattacksCuneyt Gurcan Akcora, Jonathan Z. Bakdash, Yulia R. Gel, Murat Kantarcioglu, Laura R. Marusich, Bhavani M. Thuraisingham. 55-57 [doi]
- Leveraging Intra-Day Temporal Variations to Predict Daily Cyberattack ActivityGordon Werner, Shanchieh Yang, Katie McConky. 58-63 [doi]
- DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address DetectionArya Renjan, Karuna Pande Joshi, Sandeep Nair Narayanan, Anupam Joshi. 64-69 [doi]
- Identifying, Collecting, and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMsPo-Yi Du, Ning Zhang, Mohammedreza Ebrahimi, Sagar Samtani, Ben Lazarine, Nolan Arnold, Rachael Dunn, Sandeep Suntwal, Guadalupe Angeles, Robert Schweitzer, Hsinchun Chen. 70-75 [doi]
- Evaluation of crime topic models: topic coherence vs spatial crime concentrationRitika Pandey, George O. Mohler. 76-78 [doi]
- Analysis of Hacking Related Trade in the DarkwebOthmane Cherqi, Ghita Mezzour, Mounir Ghogho, Mohammed El Koutbi. 79-84 [doi]
- Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning ApproachMohammadReza Ebrahimi, Mihai Surdeanu, Mihai Surdeanu, Hsinchun Chen. 85-90 [doi]
- Finding Cryptocurrency Attack Indicators Using Temporal Logic and Darkweb DataMohammed Almukaynizi, Vivin Paliath, Malay Shah, Malav Shah, Paulo Shakarian. 91-93 [doi]
- Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory StudyRyan Williams, Sagar Samtani, Mark W. Patton, Hsinchun Chen. 94-99 [doi]
- Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) ResiliencyEmma McMahon, Mark W. Patton, Sagar Samtani, Hsinchun Chen. 100-105 [doi]
- Identifying Privacy Functional Requirements for Crowdsourcing Applications in Smart CitiesMonica da Silva, José Viterbo, Flávia Bernardini, Cristiano Maciel. 106-111 [doi]
- Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine LearningMaede Zolanvari, Marcio Andrey Teixeira, Raj Jain. 112-117 [doi]
- Copresence networksDavid B. Skillicorn, Christian Leuprecht. 118-123 [doi]
- Political Bots and the Swedish General ElectionJohan Fernquist, Lisa Kaati, Ralph Schroeder. 124-129 [doi]
- Lifting the Smokescreen: Detecting Underlying Anomalies During a DDoS AttackBrian Ricks, Bhavani M. Thuraisingham, Patrick Tague. 130-135 [doi]
- Putting all eggs in a single basket: A cross-community analysis of 12 hacking forumsRichard Frank, Myfanwy Thomson, Alexander Mikhaylov, Andrew J. Park. 136-141 [doi]
- Measuring the Effectiveness of Network DeceptionShridatt Sugrim, Sridhar Venkatesan, Jason A. Youzwak, Cho-Yu Jason Chiang, Ritu Chadha, Massimiliano Albanese, Hasan Cam. 142-147 [doi]
- Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education InstitutionsChristopher R. Harrell, Mark W. Patton, Hsinchun Chen, Sagar Samtani. 148-153 [doi]
- Analysing Indicator of Compromises for Ransomware: Leveraging IOCs with Machine Learning TechniquesMayank Verma, Ponnurangam Kumarguru, Shuva Brata Deb, Anuradha Gupta. 154-159 [doi]
- A Temporal Recurrent Neural Network Approach to Detecting Market Anomaly Attacks Submission Type: Short PaperYifan Huang, Wingyan Chung, Xinlin Tang. 160-162 [doi]
- Detecting Saturation Attacks in Software-Defined NetworksZhiyuan Li, Weijia Xing, Dianxiang Xu. 163-168 [doi]
- Early Identification of Pathogenic Social Media AccountsHamidreza Alvari, Elham Shaabani, Paulo Shakarian. 169-174 [doi]
- Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing RatesMehdi Zakroum, Abdellah Houmz, Mounir Ghogho, Ghita Mezzour, Abdelkader Lahmadi, Jérôme François, Mohammed El Koutbi. 175-180 [doi]
- Privacy Preserving on Trajectories Created by Wi-Fi Connections in a University CampusFernanda Oliveira Gomes, Douglas Simões Silva, Bruno Machado Agostinho, Jean Everson Martina. 181-186 [doi]
- SPERG: Scalable Political Event Report Geoparsing in Big DataAswin Krishna Gunasekaran, Maryam Bahojb Imani, Latifur Khan, Christan Grant, Patrick T. Brandt, Jennifer S. Holmes. 187-192 [doi]
- From Public Gatherings to the Burst of Collective Violence: An Agent-based Emotion Contagion ModelLida Huang, Guoray Cai, Hongyong Yuan, Jianguo Chen. 193-198 [doi]
- Security Analysis of the RaSTA Safety ProtocolMarkus Heinrich, Jannik Vieten, Tolga Arul, Stefan Katzenbeisser 0001. 199-204 [doi]
- Directed Digital HateBjörn Pelzer, Lisa Kaati, Nazar Akrami. 205-210 [doi]
- Attention-based Multi-hop Reasoning for Knowledge GraphZikang Wang, Linjing Li, Daniel Dajun Zeng, Yue Chen. 211-213 [doi]
- Joint Learning with Keyword Extraction for Event Detection in Social MediaGuandan Chen, Wenji Mao, Qingchao Kong, Han Han. 214-219 [doi]
- PhishMon: A Machine Learning Framework for Detecting Phishing WebpagesAmirreza Niakanlahiji, Bei-tseng Chu, Ehab Al-Shaer. 220-225 [doi]
- A Broker Architecture, Push-Pull Database System for Intelligence AnalysisAntonio Badia. 226-231 [doi]
- A Partition and Interaction Combined Model for Social Event Popularity PredictionGuandan Chen, Qingchao Kong, Wenji Mao, Daniel Zeng. 232-237 [doi]
- Using Deep Neural Networks to Translate Multi-lingual Threat IntelligencePriyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna Pande Joshi. 238-243 [doi]
- Extracting Textual Features of Financial Social Media to Detect Cognitive HackingWingyan Chung, Jinwei Liu, Xinlin Tang, Vincent Siu-king Lai. 244-246 [doi]