default search action
ISI 2021: San Antonio, TX, USA
- IEEE International Conference on Intelligence and Security Informatics, ISI 2021, San Antonio, TX, USA, November 2-3, 2021. IEEE 2021, ISBN 978-1-6654-3838-4
- Abdulrahman Aldkheel, Lina Zhou, Kanlun Wang:
Characterization of Domestic Violence through Self-disclosure in Social Media: A Case Study of the Time of COVID-19. 1-3 - Othmane Cherqi, Hicham Hammouchi, Mounir Ghogho, Houda Benbrahim:
Leveraging Open Threat Exchange (OTX) to Understand Spatio-Temporal Trends of Cyber Threats: Covid-19 Case Study. 1-6 - Yizhi Liu, Fang Yu Lin, Mohammadreza Ebrahimi, Weifeng Li, Hsinchun Chen:
Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach. 1-6 - Zizhen Deng, Xiaolong Zheng, Zifan Ye, Zhen Cai, Daniel Dajun Zeng:
Credible Influence Analysis in Mass Media Using Causal Inference. 1-5 - Maria Valero, Lei Li, Hossain Shahriar, Shahriar Sobhan, Michael Steven Handlin, Jinghua Zhang:
Emotional Analysis of Learning Cybersecurity with Games. 1-6 - Zhiyuan Ding, Victor A. Benjamin, Weifeng Li, Xueyan Yin:
Exploring Differences Among Darknet and Surface Internet Hacking Communities. 1-3 - Yuan Tian, Nan Xu, Wenji Mao, Yin Luo:
A Central Opinion Extraction Framework for Boosting Performance on Sentiment Analysis. 1-6 - Brett A. Jefferson, Natalie C. Heller, Joseph A. Cottam, Nhuy Van, George Chin:
The Utility in Conjoint Analysis as a Fast Expert Elicitation Technique. 1-6 - Lauren Maunder, Joshua Lyons, Lauren Anderson, Joe Harrison, Brian Timana-Gomez, Paul O'Donnell, Kiernan B. George, Alan J. Michaels:
Identifying Corporate Political Trends Online. 1-6 - Haoda Qian, Liping Chen, Qiwen Zha:
Mining User's Opinion Towards the Rising and Falling Trends of the Stock Market: A Hybrid Model. 1-3 - Sai Sree Laya Chukkapalli, Nisha Pillai, Sudip Mittal, Anupam Joshi:
Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase. 1-6 - Lina Zhou, Kanlun Wang, Jianwei Lai, Dongsong Zhang:
Behaviors of Unwarranted Password Identification via Shoulder-Surfing during Mobile Authentication. 1-3 - Jalal Ghadermazi, Soumyadeep Hore, Dinesh Sharma, Ankit Shah:
Adversarial Deep Reinforcement Learning Enabled Threat Analytics Framework for Constrained Spatio-Temporal Movement Intelligence Data. 1-6 - Stefano Z. Stamato, Andrew J. Park, Brian Eng, Valerie Spicer, Herbert H. Tsang, D. Kim Rossmo:
Differences in Geographic Profiles When Using Street Routing Versus Manhattan Distances in Buffer Zone Radii Calculations. 1-6 - Jaewan Lim, Lina Zhou, Dongsong Zhang:
Verbal Deception Cue Training for the Detection of Phishing Emails. 1-3 - Bo-Xiang Wang, Jiann-Liang Chen, Chiao-Lin Yu:
Cyber Security Threat Intelligence Monitoring and Classification. 1-3 - Xingwei Zhang, Xiaolong Zheng, Wenji Mao:
Attacking DNN-based Cross-modal Retrieval Hashing Framework with Adversarial Perturbations. 1-6 - Rayah Al-Qurashi, Ahmed Aleroud, Ahmad A. Saifan, Mohammad Alsmadi, Izzat Alsmadi:
Generating Optimal Attack Paths in Generative Adversarial Phishing. 1-6 - Avishek Bose, Shreya Gopal Sundari, Vahid Behzadan, William H. Hsu:
Tracing Relevant Twitter Accounts Active in Cyber Threat Intelligence Domain by Exploiting Content and Structure of Twitter Network. 1-6 - Moojan Pordelkhaki, Shereen Fouad, Mark B. Josephs:
Intrusion Detection for Industrial Control Systems by Machine Learning using Privileged Information. 1-6 - Tala Vahedi, Benjamin Ampel, Sagar Samtani, Hsinchun Chen:
Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach. 1-6 - Martin Husák:
Towards a Data-Driven Recommender System for Handling Ransomware and Similar Incidents. 1-6 - Vishnuvardhan V. Iyer, Meizhi Wang, Jaydeep Kulkarni, Ali E. Yilmaz:
A Systematic Evaluation of EM and Power Side-Channel Analysis Attacks on AES Implementations. 1-6 - James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen:
Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach. 1-6 - Hanxuan Yang, Qingchao Kong, Wenji Mao, Lei Wang:
Boosting Hidden Graph Node Classification for Large Social Networks. 1-6 - Marek Sikora, Radek Fujdiak, Jiri Misurec:
Analysis and detection of application-independent slow Denial of Service cyber attacks. 1-6 - Jaime D. Acevedo-Viloria, Sebastián Soriano Pérez, Jesus Solano, David Zarruk-Valencia, Fernando G. Paulin, Alejandro Correa Bahnsen:
Feature-Level Fusion of Super-App and Telecommunication Alternative Data Sources for Credit Card Fraud Detection. 1-6 - Joe Harrison, Joshua Lyons, Lauren Anderson, Lauren Maunder, Paul O'Donnell, Kiernan B. George, Alan J. Michaels:
Quantifying Use and Abuse of Personal Information. 1-6 - Ying Sun, Qingchao Kong, Luwen Huangfu, Jin Pan:
Domain-oriented News Recommendation in Security Applications. 1-6 - Yunrong Yang, Zhidong Cao, Pengfei Zhao, Daniel Dajun Zeng, Qingpeng Zhang, Yin Luo:
Extracting Impacts of Non-pharmacological Interventions for COVID-19 From Modelling Study. 1-6 - Tianyi Luo, Zhidong Cao, Pengfei Zhao, Daniel Dajun Zeng, Qingpeng Zhang:
Evaluating the Impact of Vaccination on COVID-19 Pandemic Used a Hierarchical Weighted Contact Network Model. 1-6 - Kaeli Otto, Benjamin Ampel, Sagar Samtani, Hongyi Zhu, Hsinchun Chen:
Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach. 1-6 - Benjamin Ampel, Hsinchun Chen:
Distilling Contextual Embeddings Into A Static Word Embedding For Improving Hacker Forum Analytics. 1-3 - Rebecca Jones, Daniel Fortin, Samrat Chatterjee, Dennis G. Thomas, Lisa Newburn:
User Role Identification in Software Vulnerability Discussions over Social Networks. 1-3
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.