


default search action
ISI 2021: San Antonio, TX, USA
- IEEE International Conference on Intelligence and Security Informatics, ISI 2021, San Antonio, TX, USA, November 2-3, 2021. IEEE 2021, ISBN 978-1-6654-3838-4
- Abdulrahman Aldkheel
, Lina Zhou, Kanlun Wang:
Characterization of Domestic Violence through Self-disclosure in Social Media: A Case Study of the Time of COVID-19. 1-3 - Othmane Cherqi, Hicham Hammouchi
, Mounir Ghogho, Houda Benbrahim
:
Leveraging Open Threat Exchange (OTX) to Understand Spatio-Temporal Trends of Cyber Threats: Covid-19 Case Study. 1-6 - Yizhi Liu, Fang Yu Lin, Mohammadreza Ebrahimi, Weifeng Li
, Hsinchun Chen:
Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach. 1-6 - Zizhen Deng, Xiaolong Zheng, Zifan Ye, Zhen Cai, Daniel Dajun Zeng:
Credible Influence Analysis in Mass Media Using Causal Inference. 1-5 - Maria Valero, Lei Li, Hossain Shahriar
, Shahriar Sobhan, Michael Steven Handlin, Jinghua Zhang:
Emotional Analysis of Learning Cybersecurity with Games. 1-6 - Zhiyuan Ding, Victor A. Benjamin, Weifeng Li
, Xueyan Yin:
Exploring Differences Among Darknet and Surface Internet Hacking Communities. 1-3 - Yuan Tian, Nan Xu, Wenji Mao, Yin Luo:
A Central Opinion Extraction Framework for Boosting Performance on Sentiment Analysis. 1-6 - Brett A. Jefferson
, Natalie C. Heller, Joseph A. Cottam, Nhuy Van, George Chin:
The Utility in Conjoint Analysis as a Fast Expert Elicitation Technique. 1-6 - Lauren Maunder, Joshua Lyons, Lauren Anderson, Joe Harrison
, Brian Timana-Gomez, Paul O'Donnell, Kiernan B. George, Alan J. Michaels:
Identifying Corporate Political Trends Online. 1-6 - Haoda Qian, Liping Chen, Qiwen Zha:
Mining User's Opinion Towards the Rising and Falling Trends of the Stock Market: A Hybrid Model. 1-3 - Sai Sree Laya Chukkapalli, Nisha Pillai, Sudip Mittal, Anupam Joshi:
Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase. 1-6 - Lina Zhou, Kanlun Wang, Jianwei Lai, Dongsong Zhang:
Behaviors of Unwarranted Password Identification via Shoulder-Surfing during Mobile Authentication. 1-3 - Jalal Ghadermazi, Soumyadeep Hore, Dinesh Sharma, Ankit Shah:
Adversarial Deep Reinforcement Learning Enabled Threat Analytics Framework for Constrained Spatio-Temporal Movement Intelligence Data. 1-6 - Stefano Z. Stamato, Andrew J. Park, Brian Eng, Valerie Spicer, Herbert H. Tsang
, D. Kim Rossmo:
Differences in Geographic Profiles When Using Street Routing Versus Manhattan Distances in Buffer Zone Radii Calculations. 1-6 - Jaewan Lim, Lina Zhou, Dongsong Zhang:
Verbal Deception Cue Training for the Detection of Phishing Emails. 1-3 - Bo-Xiang Wang, Jiann-Liang Chen, Chiao-Lin Yu:
Cyber Security Threat Intelligence Monitoring and Classification. 1-3 - Xingwei Zhang, Xiaolong Zheng, Wenji Mao:
Attacking DNN-based Cross-modal Retrieval Hashing Framework with Adversarial Perturbations. 1-6 - Rayah Al-Qurashi, Ahmed Aleroud, Ahmad A. Saifan, Mohammad Alsmadi, Izzat Alsmadi:
Generating Optimal Attack Paths in Generative Adversarial Phishing. 1-6 - Avishek Bose, Shreya Gopal Sundari, Vahid Behzadan, William H. Hsu:
Tracing Relevant Twitter Accounts Active in Cyber Threat Intelligence Domain by Exploiting Content and Structure of Twitter Network. 1-6 - Moojan Pordelkhaki, Shereen Fouad
, Mark B. Josephs
:
Intrusion Detection for Industrial Control Systems by Machine Learning using Privileged Information. 1-6 - Tala Vahedi
, Benjamin Ampel, Sagar Samtani
, Hsinchun Chen:
Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach. 1-6 - Martin Husák:
Towards a Data-Driven Recommender System for Handling Ransomware and Similar Incidents. 1-6 - Vishnuvardhan V. Iyer, Meizhi Wang
, Jaydeep Kulkarni, Ali E. Yilmaz:
A Systematic Evaluation of EM and Power Side-Channel Analysis Attacks on AES Implementations. 1-6 - James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen:
Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach. 1-6 - Hanxuan Yang, Qingchao Kong, Wenji Mao, Lei Wang:
Boosting Hidden Graph Node Classification for Large Social Networks. 1-6 - Marek Sikora, Radek Fujdiak, Jiri Misurec:
Analysis and detection of application-independent slow Denial of Service cyber attacks. 1-6 - Jaime D. Acevedo-Viloria, Sebastián Soriano Pérez, Jesus Solano, David Zarruk-Valencia, Fernando G. Paulin, Alejandro Correa Bahnsen:
Feature-Level Fusion of Super-App and Telecommunication Alternative Data Sources for Credit Card Fraud Detection. 1-6 - Joe Harrison
, Joshua Lyons, Lauren Anderson, Lauren Maunder, Paul O'Donnell, Kiernan B. George, Alan J. Michaels:
Quantifying Use and Abuse of Personal Information. 1-6 - Ying Sun, Qingchao Kong, Luwen Huangfu, Jin Pan:
Domain-oriented News Recommendation in Security Applications. 1-6 - Yunrong Yang, Zhidong Cao, Pengfei Zhao, Daniel Dajun Zeng, Qingpeng Zhang
, Yin Luo:
Extracting Impacts of Non-pharmacological Interventions for COVID-19 From Modelling Study. 1-6 - Tianyi Luo, Zhidong Cao, Pengfei Zhao, Daniel Dajun Zeng, Qingpeng Zhang
:
Evaluating the Impact of Vaccination on COVID-19 Pandemic Used a Hierarchical Weighted Contact Network Model. 1-6 - Kaeli Otto, Benjamin Ampel, Sagar Samtani
, Hongyi Zhu
, Hsinchun Chen:
Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach. 1-6 - Benjamin Ampel, Hsinchun Chen:
Distilling Contextual Embeddings Into A Static Word Embedding For Improving Hacker Forum Analytics. 1-3 - Rebecca Jones, Daniel Fortin, Samrat Chatterjee, Dennis G. Thomas, Lisa Newburn:
User Role Identification in Software Vulnerability Discussions over Social Networks. 1-3

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.