


default search action
ISI 2020: Arlington, VA, USA
- IEEE International Conference on Intelligence and Security Informatics, ISI 2020, Arlington, VA, USA, November 9-10, 2020. IEEE 2020, ISBN 978-1-7281-8800-3
- Bingyan Du, Pranay Singhal, Victor A. Benjamin, Weifeng Li
:
Detecting Cyber-Adversarial Videos in Traditional Social media. 1-3 - Kanishk Rana, Rahul Madaan:
Evaluating Effectiveness of Adversarial Examples on State of Art License Plate Recognition Models. 1-3 - David G. Dobolyi
, Ahmed Abbasi
, F. Mariam Zahedi, Anthony Vance
:
An Ordinal Approach to Modeling and Visualizing Phishing Susceptibility. 1-6 - Zhiqing Zhang, Pawissakan Chirupphapa, Hiroshi Esaki, Hideya Ochiai:
XGBoosted Misuse Detection in LAN-Internal Traffic Dataset. 1-6 - Fernanda Oliveira Gomes, Bruno Machado Agostinho, Jean Everson Martina:
Fraud Prevention Within the Brazilian Governmental Public-Key Infrastructure. 1-6 - Antonio Badia:
Conceptual Models for Counter-Terrorism and Intelligence Knowledge Bases. 1-3 - Matthew Sills, Priyanka Ranade, Sudip Mittal:
Cybersecurity Threat Intelligence Augmentation and Embedding Improvement - A Healthcare Usecase. 1-6 - Rajasekhar Ganduri, Ram Dantu, Mark A. Thompson, Samuel Evans, Logan Widick:
A Human-Network-Security-Interface for an Average Joe. 1-6 - Masashi Kadoguchi, Hanae Kobayashi, Shota Hayashi, Akira Otsuka, Masaki Hashimoto
:
Deep Self-Supervised Clustering of the Dark Web for Cyber Threat Intelligence. 1-6 - Samira Khorshidi
, George O. Mohler, Jeremy G. Carter:
Assessing GAN-based approaches for generative modeling of crime text reports. 1-6 - Gaddisa Olani Ganfure, Chun-Feng Wu
, Yuan-Hao Chang, Wei-Kuan Shih:
DeepGuard: Deep Generative User-behavior Analytics for Ransomware Detection. 1-6 - Syed Hasan Amin Mahmood
, Syed Mustafa Ali Abbasi, Ahmed Abbasi
, Fareed Zaffar:
Phishcasting: Deep Learning for Time Series Forecasting of Phishing Attacks. 1-6 - Rongrong Jing, Hu Tian, Yidi Li, Xingwei Zhang, Xiaolong Zheng, Zhu Zhang, Daniel Zeng:
Improving the Data Quality for Credit Card Fraud Detection. 1-6 - Mustapha Hedabou, Yunusa Simpa Abdulsalam:
Efficient and Secure Implementation of BLS Multisignature Scheme on TPM. 1-6 - Aritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, Tim Finin
:
Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior. 1-6 - Leila Haj Meftah, Rafik Braham:
A virtual simulation environment using deep learning for autonomous vehicles obstacle avoidance. 1-7 - Pu Miao, Hu Tian, Xingwei Zhang, Saike He, Xiaolong Zheng, Desheng Dash Wu, Daniel Zeng:
Analyzing the Evolutionary Characteristics of the Cluster of COVID-19 under Anti-contagion Policies. 1-6 - Joeri G. T. Peters, Floris J. Bex:
Towards a Story Scheme Ontology of Terrorist MOs. 1-6 - Tiago Martins Andrade
, Max Smith-Creasey, Jonathan Francis Roscoe
:
Discerning User Activity in Extended Reality Through Side-Channel Accelerometer Observations. 1-3 - Yonghan Zhu
, Yuqiao Jiang:
The Four-Stages Strategies on Social Media to Cope with "Infodemic" and Repair Public Trust: Covid-19 Disinformation and Effectiveness of Government Intervention in China. 1-5 - Smirti Dwibedi, Medha Pujari, Weiqing Sun:
A Comparative Study on Contemporary Intrusion Detection Datasets for Machine Learning Research. 1-6 - Shuai Wang, Lei Wang, Wenji Mao:
A KG-based Enhancement Framework for Fact Checking Using Category Information. 1-6 - Arnab Bhattacharya, Thiagarajan Ramachandran
, Sandeep Banik, Chase P. Dowling, Shaunak D. Bopardikar:
Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement Learning. 1-6 - Mir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu
, Shouhuai Xu:
Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites. 1-6 - Jan William Johnsen, Katrin Franke:
Identifying Proficient Cybercriminals Through Text and Network Analysis. 1-7 - Maksim Ekin Eren
, Juston S. Moore, Boian S. Alexandrov
:
Multi-Dimensional Anomalous Entity Detection via Poisson Tensor Factorization. 1-6 - Jefferson Viana Fonseca Abreu
, Célia Ghedini Ralha
, João José Costa Gondim:
Twitter Bot Detection with Reduced Feature Set. 1-6 - Nilanjan Sen, Ram Dantu, Mark A. Thompson:
Performance Analysis of Secure Real-time Transport Protocol Using Elliptic Curves. 1-7 - Bibek Upadhayay, Vahid Behzadan:
Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification. 1-6 - Aaron Walker
, Shamik Sengupta:
Malware Family Fingerprinting Through Behavioral Analysis. 1-5 - Andreea-Elena Panait:
Is the user identity perception influenced by the blockchain technology? 1-3 - Fuad Mire Hassan, Mark Lee
:
Political Fake Statement Detection via Multistage Feature-assisted Neural Modeling. 1-6 - Xinglin Xiao, Lei Wang, Qingchao Kong, Wenji Mao:
Social Emotion Cause Extraction from Online Texts. 1-6 - Hashim Abu-gellban
:
A Survey of Real-Time Social-Based Traffic Detection. 1-6 - Fabian Schillinger, Christian Schindelhauer
:
A Proxy-Based Encrypted Online Social Network With Fine-Grained Access. 1-5 - Hanae Kobayashi, Masashi Kadoguchi, Shota Hayashi, Akira Otsuka, Masaki Hashimoto
:
An Expert System for Classifying Harmful Content on the Dark Web. 1-6 - Ning Zhang, Mohammadreza Ebrahimi, Weifeng Li
, Hsinchun Chen:
A Generative Adversarial Learning Framework for Breaking Text-Based CAPTCHA in the Dark Web. 1-6 - Perry Deng, Cooper Linsky, Matthew Wright
:
Weaponizing Unicodes with Deep Learning -Identifying Homoglyphs with Weakly Labeled Data. 1-6 - Mir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu, Shouhuai Xu:
Characterizing the Landscape of COVID-19 Themed Cyberattacks and Defenses. 1-6 - Yizhi Liu, Fang Yu Lin, Zara Ahmad-Post, Mohammadreza Ebrahimi, Ning Zhang, James Lee Hu, Jingyu Xin, Weifeng Li
, Hsinchun Chen:
Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web. 1-6 - Moumita Das Purba, Bill Chu, Ehab Al-Shaer:
From Word Embedding to Cyber-Phrase Embedding: Comparison of Processing Cybersecurity Texts. 1-6 - Jagannadh Vempati, Ram Dantu, Syed Badruddoja
, Mark A. Thompson:
Adaptive and Predictive SDN Control During DDoS Attacks. 1-6 - Ben Lazarine, Sagar Samtani
, Mark W. Patton, Hongyi Zhu
, Steven Ullman
, Benjamin Ampel, Hsinchun Chen:
Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach. 1-6 - Steven Ullman
, Sagar Samtani
, Ben Lazarine, Hongyi Zhu
, Benjamin Ampel, Mark W. Patton, Hsinchun Chen:
Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach. 1-6 - Muqeet Ali, Josiah Hagen, Jonathan Oliver:
Scalable Malware Clustering using Multi-Stage Tree Parallelization. 1-6 - Eric Ficke, Shouhuai Xu:
APIN: Automatic Attack Path Identification in Computer Networks. 1-6 - Benjamin Ampel, Sagar Samtani
, Hongyi Zhu
, Steven Ullman
, Hsinchun Chen:
Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach. 1-6 - Rômulo Almeida, Carla M. Westphall:
Heuristic Phishing Detection and URL Checking Methodology Based on Scraping and Web Crawling. 1-6 - So-Hyun Park, Il-Gu Lee:
Effective Voice Fuzzing Method for Finding Vulnerabilities in AI Speech Recognition Devices. 1-6 - B. Simons, David B. Skillicorn:
A Bootstrapped Model to Detect Abuse and Intent in White Supremacist Corpora. 1-6 - Marcos Rogério Silveira, Adriano Mauro Cansian, Hugo Koji Kobayashi:
Detection of Malicious Domains Using Passive DNS with XGBoost. 1-3

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.