Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Achim Osswald |
For You, Me, Them? - Choosing Designated Communities for Personal Digital Archiving. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Dirk Lewandowski, Sebastian Sünkler, Friederike Kerkmann |
Are Ads on Google Search Engine Results Pages Labeled Clearly Enough? - The Influence of Knowledge on Search Ads on Users' Selection Behaviour. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Elisabeth Vogler, Christoph Schindler 0001, Alexander Botte, Marc Rittberger |
Are Altmetrics Effective in Transdisciplinary Research Fields? - Altmetric Coverage of Outputs in Educational Research. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Anthea Moravánszky |
How Can Social Software Enhance Training Measures within Software Implementations in the Financial Sector? |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Alexandra Linhart |
Google Now and User Data - A Diary Study on Perceptions of Collection and Use of Personal Data by Google Now Cards. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fabian Muster |
Data Strategy Model - A Reference Model to Develop Data Strategies. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fabian Odoni |
Development of Knowledge Management Performance Metrics for Enterprise Social Software. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Eva-Maria Meier, Patricia Böhm, Christian Wolff 0001 |
Comparing Heuristic Walkthrough and User Studies in Evaluating Digital Appliances. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fabian Odoni, Wolfgang Semar, Elena Mastrandrea |
VICI - Visualisation of Collaboration in Social Enterprise Software Systems. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Antje Michel |
"Information and Learning" - Research at the Interface between Information Science and the Learning Sciences. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Corinna Breitinger, Bela Gipp |
Virtual Patent - Enabling the Traceability of Ideas Shared Online Using Decentralized Trusted Timestamping. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Vera Hillebrand, Elke Greifeneder |
International Degree Mobility in Library and Information Science. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ze Li, Duoyong Sun, Kun Cai, Bo Li 0030 |
Tie strength still matters: Investigating interaction patterns of Al-Qaeda network in terror operations. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Caminha, Vasco Furtado |
Impact of human mobility on police allocation. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Neda Abdelhamid, Fadi A. Thabtah, Hussein Abdel-jaber |
Phishing detection: A recent intelligent machine learning comparison based on models content and features. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Peng Su, Yuqin Zhao, Jian Yang, Zhenpeng Li |
A new approach to security informatics: Actionable behavioral rules mining (ABRM). |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yasmeen Alufaisan, Yan Zhou 0001, Murat Kantarcioglu, Bhavani Thuraisingham |
Hacking social network data mining. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Qian Li, Xiu-cun Wang |
The impact of different perceived support dimensions of mobile media APP users on customer commitment and customer recommendation. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Saike He, Xiaolong Zheng 0001, Daniel Zeng 0001 |
Modeling online collective emotions through knowledge transfer. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Aaron Zimba, Zhaoshun Wang, Hongsong Chen |
Reasoning crypto ransomware infection vectors with Bayesian networks. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hongliang Liang, Yan Song, Da Xiao |
An end-to-end model for Android malware detection. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xiangfei Kong, Wenji Mao |
Ranking events based on user relevant query. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Pengshuai Cui, Peidong Zhu, Peng Xun, Zhuoqun Xia |
Enhance the robustness of cyber-physical systems by adding interdependency. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wangyan Feng, Wenfeng Yan, Shuning Wu, Ningwei Liu |
Wavelet transform and unsupervised machine learning to detect insider threat on cloud file-sharing. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Junjie Lin, Wenji Mao, Daniel Zeng 0001 |
Topic and user based refinement for competitive perspective identification. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Aaron Zimba, Zhaoshun Wang |
On Man-In-The-Cloud (MITC) attacks: The analytical case of Linux. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Guandan Chen, Qingchao Kong, Wenji Mao |
An attention-based neural popularity prediction model for social media events. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Emma McMahon, Ryan Williams, Malaka El, Sagar Samtani, Mark W. Patton, Hsinchun Chen |
Assessing medical device vulnerabilities on the Internet of Things. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Song Sun, Qiudan Li, Peng Yan, Daniel Dajun Zeng |
Mapping users across social media platforms by integrating text and structure information. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wingyan Chung |
Developing curricular modules for cybersecurity informatics: An active learning approach. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry Devyatkin, Ivan V. Smirnov, Ananyeva Margarita, Maria Kobozeva, Chepovskiy Andrey, Solovyev Fyodor |
Exploring linguistic features for extremist texts detection (on the material of Russian-speaking illegal texts). |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | |
2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017 |
ISI |
2017 |
DBLP BibTeX RDF |
|
1 | Ravi Barreira, Vládia Pinheiro, Vasco Furtado |
A framework for digital forensics analysis based on semantic role labeling. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Linpeng Chai, Bin Zhang |
An identity-based one-off public key scheme for privacy preservation. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Chiyu Cai, Linjing Li, Daniel Zeng 0001 |
Web-derived Emotional Word Detection in social media using Latent Semantic information. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sonya H. Y. Hsu, Steven J. Dick |
Information sharing & cyber threats. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Charles Feng, Shuning Wu, Ningwei Liu |
A user-centric machine learning framework for cyber security operations center. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Saike He, Xiaolong Zheng 0001, Daniel Zeng 0001 |
The dynamics of health sentiments with competitive interactions in social media. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Josephine K. Chow, Xiangyang Li, Xenia Mountrouidou |
Raising flags: Detecting covert storage channels using relative entropy. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jin-Seong Kim, Im Young Jung |
Android app protection using same identifier attack defensor. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yuhao Zhang, Wenji Mao, Daniel Zeng 0001 |
Topic evolution modeling in social media short texts based on recurrent semantic dependent CRP. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Beibei Tian, Feifei Zheng, Yuqi Cao |
Research on the relationship between informatization level and global competitiveness. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Keyi Li, Yang Li, Jianyi Liu, Ru Zhang, Xi Duan |
Attack pattern mining algorithm based on security log. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wei Wang 0137, Ming Zhu, Jinlin Wang 0001, Xuewen Zeng, Zhongzhen Yang |
End-to-end encrypted traffic classification with one-dimensional convolution neural networks. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Williams, Emma McMahon, Sagar Samtani, Mark W. Patton, Hsinchun Chen |
Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sreyasee Das Bhattacharjee, Ashit Talukder, Ehab Al-Shaer, Pratik Doshi |
Prioritized active learning for malicious URL detection using weighted text-based features. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lu Luo, Peng Cao, Dazhong Mu |
Research on high-resolution imaging technology to extract the halftone-dot-information by iPhone. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mehdi Yousefi, Nhamo Mtetwa, Yan Zhang 0047, Huaglory Tianfield |
A novel approach for analysis of attack graph. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Malaka El, Emma McMahon, Sagar Samtani, Mark W. Patton, Hsinchun Chen |
Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Chiyu Cai, Linjing Li, Daniel Zeng 0001 |
Behavior enhanced deep bot detection in social media. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | John Grisham, Sagar Samtani, Mark W. Patton, Hsinchun Chen |
Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rodney R. Rohrmann, Vincent J. Ercolani, Mark W. Patton |
Large scale port scanning through tor using parallel Nmap scans to scan large portions of the IPv4 range. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zhichao Cheng, Fanping Zeng, Xingqiu Zhong, Mingsong Zhou, Chengcheng Lv, Shuli Guo |
Resolving reflection methods in Android applications. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yen-Lung Lai, Bok-Min Goi, Tong-Yuen Chai |
Alignment-free indexing-first-one hashing with bloom filter integration. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zihao Liu, Bin Zhang, Ning Zhu, Lixun Li |
Hierarchical network threat situation assessment method for DDoS based on D-S evidence theory. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Tuomo Hiippala |
Recognizing military vehicles in social media images using deep learning. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jie Bai, Linjing Li, Lan Lu, Yanwu Yang, Daniel Zeng 0001 |
Real-time prediction of meme burst. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wingyan Chung, Elizabeth Mustaine, Daniel Zeng 0001 |
Criminal intelligence surveillance and monitoring on social media: Cases of cyber-trafficking. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | C. Y. Tseung, Kam-Pui Chow, X. Zhang |
Extended abstract: Anti-DDoS technique using self-learning bloom filter. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xiaohui Han, Lianhai Wang, Shujiang Xu, Guangqi Liu, Dawei Zhao |
Linking social network accounts by modeling user spatiotemporal habits. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Nan Xu |
Analyzing multimodal public sentiment based on hierarchical semantic attentional network. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hongyuan Ma, Ou Tao, Chunlu Zhao, Pengxiao Li, Lihong Wang |
Impact of replacement policies on static-dynamic query results cache in web search engines. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Canchu Lin, Jenell L. S. Wittmer |
Proactive information security behavior and individual creativity: Effects of group culture and decentralized IT governance. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Schon, Niall M. Adams, Marina Evangelou |
Clustering and monitoring edge behaviour in enterprise network traffic. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Su Hou, Tianliang Lu, Yanhui Du, Jing Guo |
Static detection of Android malware based on improved random forest algorithm. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hsin-Hsiung Huang, Zijing Wang, Wingyan Chung |
Efficient parameter selection for SVM: The case of business intelligence categorization. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Guandan Chen, Qingchao Kong, Wenji Mao |
Online event detection and tracking in social media based on neural similarity metric learning. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Brandon W. Jones, Wingyan Chung |
Topic modeling of small sequential documents: Proposed experiments for detecting terror attacks. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sumeet Kumar, Kathleen M. Carley |
DDoS cyber-attacks network: Who's attacking whom. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin W. K. Hung, Anura P. Jayasumana, Vidarshana W. Bandara |
Detecting radicalization trajectories using graph pattern matching algorithms. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vincent J. Ercolani, Mark W. Patton, Hsinchun Chen |
Shodan visualized. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Rubin-Delanchy, Niall M. Adams, Nicholas A. Heard |
Disassortativity of computer networks. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ze Li, Duoyong Sun, Hsinchun Chen, Shin-Ying Huang |
Identifying the socio-spatial dynamics of terrorist attacks in the Middle East. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sagar Raina, Leon Bernard, Blair Taylor, Siddharth Kaza |
Using eye-tracking to investigate content skipping: A study on learning modules in cybersecurity. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Leslie C. Milton, Atif Memon |
Intruder detector: A continuous authentication tool to model user behavior. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jie Bai, Linjing Li, Daniel Zeng 0001 |
Activating topic models from a cognitive perspective. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | E. Allison Newcomb, Robert J. Hammell, Steve E. Hutchinson |
Effective prioritization of network intrusion alerts to enhance situational awareness. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sumeet Kumar, Matthew Benigni, Kathleen M. Carley |
The impact of US cyber policies on cyber-attacks trend. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Melissa J. Turcotte, Juston S. Moore, Nick Heard, Aaron McPhall |
Poisson factorization for peer-based anomaly detection. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Xiang Michelle Liu, Diane R. Murphy |
Engaging females in cybersecurity: K through Gray. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Wei Wei, Arti Mann, Kewei Sha, T. Andrew Yang |
Design and implementation of a multi-facet hierarchical cybersecurity education framework. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | John Grisham, Calvin Barreras, Cyran Afarin, Mark W. Patton, Hsinchun Chen |
Identifying top listers in Alphabay using Latent Dirichlet Allocation. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Arthur Jicha, Mark W. Patton, Hsinchun Chen |
SCADA honeypots: An in-depth analysis of Conpot. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Khudran Alzhrani, Ethan M. Rudd, Terrance E. Boult, C. Edward Chow |
Automated big text security classification. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Joel Brynielsson, Ulrik Franke, Muhammad Adnan Tariq, Stefan Varga |
Using cyber defense exercises to obtain additional data for attacker profiling. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jennifer Jie Xu 0001, Dongyu Chen, Michael Chau |
Identifying features for detecting fraudulent loan requests on P2P platforms. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mohiuddin Solaimani, Sayeed Salam, Ahmad M. Mustafa, Latifur Khan, Patrick T. Brandt, Bhavani Thuraisingham |
Near real-time atrocity event coding. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kangzhi Zhao, Yong Zhang 0002, Chunxiao Xing, Weifeng Li 0002, Hsinchun Chen |
Chinese underground market jargon analysis based on unsupervised learning. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Junjie Lin, Wenji Mao, Daniel Zeng 0001 |
Competitive perspective identification via topic based refinement for online documents. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mark Whitehouse, Marina Evangelou, Niall M. Adams |
Activity-based temporal anomaly detection in enterprise-cyber security. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Zhen Fang, Xinyi Zhao, Qiang Wei, Guoqing Chen, Yong Zhang 0002, Chunxiao Xing, Weifeng Li 0002, Hsinchun Chen |
Exploring key hackers and cybersecurity threats in Chinese hacker communities. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Saike He, Xiaolong Zheng 0001, Jiaojiao Wang, Zhijun Chang, Yin Luo, Daniel Zeng 0001 |
Meme extraction and tracing in crisis events. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Rodney Rohrmann, Mark W. Patton, Hsinchun Chen |
Anonymous port scanning: Performing network reconnaissance through Tor. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Shiva Azadegan, Michael O'Leary |
An undergraduate Cyber Operations curriculum in the making: A 10+ year report. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sagar Samtani, Shuo Yu, Hongyi Zhu, Mark W. Patton, Hsinchun Chen |
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jesus Pacheco, Shalaka Satam, Salim Hariri, Clarisa Grijalva, Helena Berkenbrock |
IoT Security Development Framework for building trustworthy Smart car services. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nick Heard, Konstantina Palla, Maria Skoularidou |
Topic modelling of authentication events in an enterprise computer network. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed T. Zulkarnine, Richard Frank, Bryan Monk, Julianna Mitchell, Garth Davies |
Surfacing collaborated networks in dark web to find illicit and criminal content. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jie Bai, Linjing Li, Daniel Zeng 0001, Junjie Lin |
Social role clustering with topic model. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nick Heard, Patrick Rubin-Delanchy |
Network-wide anomaly detection via the Dirichlet process. |
ISI |
2016 |
DBLP DOI BibTeX RDF |
|