Abstract is missing.
- Leveraging Open Threat Exchange (OTX) to Understand Spatio-Temporal Trends of Cyber Threats: Covid-19 Case StudyOthmane Cherqi, Hicham Hammouchi, Mounir Ghogho, Houda Benbrahim. 1-6 [doi]
- Behaviors of Unwarranted Password Identification via Shoulder-Surfing during Mobile AuthenticationLina Zhou, Kanlun Wang, Jianwei Lai, Dongsong Zhang. 1-3 [doi]
- Quantifying Use and Abuse of Personal InformationJoe Harrison, Joshua Lyons, Lauren Anderson, Lauren Maunder, Paul O'Donnell, Kiernan B. George, Alan J. Michaels. 1-6 [doi]
- Adversarial Deep Reinforcement Learning Enabled Threat Analytics Framework for Constrained Spatio-Temporal Movement Intelligence DataJalal Ghadermazi, Soumyadeep Hore, Dinesh Sharma, Ankit Shah. 1-6 [doi]
- Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning ApproachYizhi Liu, Fang-Yu Lin, MohammadReza Ebrahimi, Weifeng Li 0002, Hsinchun Chen. 1-6 [doi]
- Towards a Data-Driven Recommender System for Handling Ransomware and Similar IncidentsMartin Husák. 1-6 [doi]
- A Systematic Evaluation of EM and Power Side-Channel Analysis Attacks on AES ImplementationsVishnuvardhan V. Iyer, Meizhi Wang, Jaydeep Kulkarni, Ali E. Yilmaz. 1-6 [doi]
- Mining User's Opinion Towards the Rising and Falling Trends of the Stock Market: A Hybrid ModelHaoda Qian, Liping Chen, Qiwen Zha. 1-3 [doi]
- Verbal Deception Cue Training for the Detection of Phishing EmailsJaewan Lim, Lina Zhou, Dongsong Zhang. 1-3 [doi]
- Distilling Contextual Embeddings Into A Static Word Embedding For Improving Hacker Forum AnalyticsBenjamin Ampel, Hsinchun Chen. 1-3 [doi]
- Evaluating the Impact of Vaccination on COVID-19 Pandemic Used a Hierarchical Weighted Contact Network ModelTianyi Luo, Zhidong Cao, Pengfei Zhao, Daniel Dajun Zeng, Qingpeng Zhang. 1-6 [doi]
- The Utility in Conjoint Analysis as a Fast Expert Elicitation TechniqueBrett A. Jefferson, Natalie C. Heller, Joseph A. Cottam, Nhuy Van, George Chin. 1-6 [doi]
- Tracing Relevant Twitter Accounts Active in Cyber Threat Intelligence Domain by Exploiting Content and Structure of Twitter NetworkAvishek Bose, Shreya Gopal Sundari, Vahid Behzadan, William H. Hsu. 1-6 [doi]
- Generating Optimal Attack Paths in Generative Adversarial PhishingRayah Al-Qurashi, Ahmed AlEroud, Ahmad A. Saifan, Mohammad Alsmadi, Izzat Alsmadi. 1-6 [doi]
- Intrusion Detection for Industrial Control Systems by Machine Learning using Privileged InformationMoojan Pordelkhaki, Shereen Fouad, Mark Josephs. 1-6 [doi]
- Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling ApproachTala Vahedi, Benjamin Ampel, Sagar Samtani, Hsinchun Chen. 1-6 [doi]
- Feature-Level Fusion of Super-App and Telecommunication Alternative Data Sources for Credit Card Fraud DetectionJaime D. Acevedo-Viloria, Sebastián Soriano Pérez, Jesus Solano, David Zarruk-Valencia, Fernando G. Paulin, Alejandro Correa Bahnsen. 1-6 [doi]
- Cyber Security Threat Intelligence Monitoring and ClassificationBo-Xiang Wang, Jiann-Liang Chen, Chiao-Lin Yu. 1-3 [doi]
- Differences in Geographic Profiles When Using Street Routing Versus Manhattan Distances in Buffer Zone Radii CalculationsStefano Z. Stamato, Andrew J. Park, Brian Eng, Valerie Spicer, Herbert H. Tsang, D. Kim Rossmo. 1-6 [doi]
- Credible Influence Analysis in Mass Media Using Causal InferenceZizhen Deng, Xiaolong Zheng 0001, Zifan Ye, Zhen Cai, Daniel Dajun Zeng. 1-5 [doi]
- Identifying Corporate Political Trends OnlineLauren Maunder, Joshua Lyons, Lauren Anderson, Joe Harrison, Brian Timana-Gomez, Paul O'Donnell, Kiernan B. George, Alan J. Michaels. 1-6 [doi]
- Boosting Hidden Graph Node Classification for Large Social NetworksHanxuan Yang, Qingchao Kong, Wenji Mao, Lei Wang 0062. 1-6 [doi]
- Domain-oriented News Recommendation in Security ApplicationsYing Sun, Qingchao Kong, Luwen Huangfu, Jin Pan. 1-6 [doi]
- Exploring Differences Among Darknet and Surface Internet Hacking CommunitiesZhiyuan Ding, Victor A. Benjamin, Weifeng Li 0002, Xueyan Yin. 1-3 [doi]
- Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding ApproachKaeli Otto, Benjamin Ampel, Sagar Samtani, Hongyi Zhu, Hsinchun Chen. 1-6 [doi]
- A Central Opinion Extraction Framework for Boosting Performance on Sentiment AnalysisYuan Tian, Nan Xu, Wenji Mao, Yin Luo. 1-6 [doi]
- Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model ApproachJames Lee Hu, MohammadReza Ebrahimi, Hsinchun Chen. 1-6 [doi]
- Attacking DNN-based Cross-modal Retrieval Hashing Framework with Adversarial PerturbationsXingwei Zhang, Xiaolong Zheng 0001, Wenji Mao. 1-6 [doi]
- Characterization of Domestic Violence through Self-disclosure in Social Media: A Case Study of the Time of COVID-19Abdulrahman Aldkheel, Lina Zhou, Kanlun Wang. 1-3 [doi]
- Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming UsecaseSai Sree Laya Chukkapalli, Nisha Pillai, Sudip Mittal, Anupam Joshi. 1-6 [doi]
- Analysis and detection of application-independent slow Denial of Service cyber attacksMarek Sikora, Radek Fujdiak, Jiri Misurec. 1-6 [doi]
- Extracting Impacts of Non-pharmacological Interventions for COVID-19 From Modelling StudyYunrong Yang, Zhidong Cao, Pengfei Zhao, Daniel Dajun Zeng, Qingpeng Zhang, Yin Luo. 1-6 [doi]
- User Role Identification in Software Vulnerability Discussions over Social NetworksRebecca Jones, Daniel Fortin, Samrat Chatterjee, Dennis G. Thomas, Lisa Newburn. 1-3 [doi]
- Emotional Analysis of Learning Cybersecurity with GamesMaria Valero, Lei Li, Hossain Shahriar, Shahriar Sobhan, Michael Steven Handlin, Jinghua Zhang. 1-6 [doi]