![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 35 matches
- 2021
- Jaime D. Acevedo-Viloria, Sebastián Soriano Pérez, Jesus Solano, David Zarruk-Valencia, Fernando G. Paulin, Alejandro Correa Bahnsen:
Feature-Level Fusion of Super-App and Telecommunication Alternative Data Sources for Credit Card Fraud Detection. ISI 2021: 1-6 - Rayah Al-Qurashi, Ahmed Aleroud, Ahmad A. Saifan, Mohammad Alsmadi, Izzat Alsmadi:
Generating Optimal Attack Paths in Generative Adversarial Phishing. ISI 2021: 1-6 - Abdulrahman Aldkheel
, Lina Zhou, Kanlun Wang:
Characterization of Domestic Violence through Self-disclosure in Social Media: A Case Study of the Time of COVID-19. ISI 2021: 1-3 - Benjamin Ampel, Hsinchun Chen:
Distilling Contextual Embeddings Into A Static Word Embedding For Improving Hacker Forum Analytics. ISI 2021: 1-3 - Avishek Bose, Shreya Gopal Sundari, Vahid Behzadan, William H. Hsu:
Tracing Relevant Twitter Accounts Active in Cyber Threat Intelligence Domain by Exploiting Content and Structure of Twitter Network. ISI 2021: 1-6 - Othmane Cherqi, Hicham Hammouchi
, Mounir Ghogho, Houda Benbrahim
:
Leveraging Open Threat Exchange (OTX) to Understand Spatio-Temporal Trends of Cyber Threats: Covid-19 Case Study. ISI 2021: 1-6 - Sai Sree Laya Chukkapalli, Nisha Pillai, Sudip Mittal, Anupam Joshi:
Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase. ISI 2021: 1-6 - Zizhen Deng, Xiaolong Zheng, Zifan Ye, Zhen Cai, Daniel Dajun Zeng:
Credible Influence Analysis in Mass Media Using Causal Inference. ISI 2021: 1-5 - Zhiyuan Ding, Victor A. Benjamin, Weifeng Li
, Xueyan Yin:
Exploring Differences Among Darknet and Surface Internet Hacking Communities. ISI 2021: 1-3 - Jalal Ghadermazi, Soumyadeep Hore, Dinesh Sharma, Ankit Shah:
Adversarial Deep Reinforcement Learning Enabled Threat Analytics Framework for Constrained Spatio-Temporal Movement Intelligence Data. ISI 2021: 1-6 - Joe Harrison
, Joshua Lyons, Lauren Anderson, Lauren Maunder, Paul O'Donnell, Kiernan B. George, Alan J. Michaels:
Quantifying Use and Abuse of Personal Information. ISI 2021: 1-6 - James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen:
Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach. ISI 2021: 1-6 - Martin Husák:
Towards a Data-Driven Recommender System for Handling Ransomware and Similar Incidents. ISI 2021: 1-6 - Vishnuvardhan V. Iyer, Meizhi Wang
, Jaydeep Kulkarni, Ali E. Yilmaz:
A Systematic Evaluation of EM and Power Side-Channel Analysis Attacks on AES Implementations. ISI 2021: 1-6 - Brett A. Jefferson
, Natalie C. Heller, Joseph A. Cottam, Nhuy Van, George Chin:
The Utility in Conjoint Analysis as a Fast Expert Elicitation Technique. ISI 2021: 1-6 - Rebecca Jones, Daniel Fortin, Samrat Chatterjee, Dennis G. Thomas, Lisa Newburn:
User Role Identification in Software Vulnerability Discussions over Social Networks. ISI 2021: 1-3 - Jaewan Lim, Lina Zhou, Dongsong Zhang:
Verbal Deception Cue Training for the Detection of Phishing Emails. ISI 2021: 1-3 - Yizhi Liu, Fang Yu Lin, Mohammadreza Ebrahimi, Weifeng Li
, Hsinchun Chen:
Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach. ISI 2021: 1-6 - Tianyi Luo, Zhidong Cao, Pengfei Zhao, Daniel Dajun Zeng, Qingpeng Zhang
:
Evaluating the Impact of Vaccination on COVID-19 Pandemic Used a Hierarchical Weighted Contact Network Model. ISI 2021: 1-6 - Lauren Maunder, Joshua Lyons, Lauren Anderson, Joe Harrison
, Brian Timana-Gomez, Paul O'Donnell, Kiernan B. George, Alan J. Michaels:
Identifying Corporate Political Trends Online. ISI 2021: 1-6 - Kaeli Otto, Benjamin Ampel, Sagar Samtani
, Hongyi Zhu
, Hsinchun Chen:
Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach. ISI 2021: 1-6 - Moojan Pordelkhaki, Shereen Fouad
, Mark B. Josephs
:
Intrusion Detection for Industrial Control Systems by Machine Learning using Privileged Information. ISI 2021: 1-6 - Haoda Qian, Liping Chen, Qiwen Zha:
Mining User's Opinion Towards the Rising and Falling Trends of the Stock Market: A Hybrid Model. ISI 2021: 1-3 - Marek Sikora, Radek Fujdiak, Jiri Misurec:
Analysis and detection of application-independent slow Denial of Service cyber attacks. ISI 2021: 1-6 - Stefano Z. Stamato, Andrew J. Park, Brian Eng, Valerie Spicer, Herbert H. Tsang
, D. Kim Rossmo:
Differences in Geographic Profiles When Using Street Routing Versus Manhattan Distances in Buffer Zone Radii Calculations. ISI 2021: 1-6 - Ying Sun, Qingchao Kong, Luwen Huangfu, Jin Pan:
Domain-oriented News Recommendation in Security Applications. ISI 2021: 1-6 - Yuan Tian, Nan Xu, Wenji Mao, Yin Luo:
A Central Opinion Extraction Framework for Boosting Performance on Sentiment Analysis. ISI 2021: 1-6 - Tala Vahedi
, Benjamin Ampel, Sagar Samtani, Hsinchun Chen:
Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach. ISI 2021: 1-6 - Maria Valero, Lei Li, Hossain Shahriar
, Shahriar Sobhan, Michael Steven Handlin, Jinghua Zhang:
Emotional Analysis of Learning Cybersecurity with Games. ISI 2021: 1-6 - Bo-Xiang Wang, Jiann-Liang Chen, Chiao-Lin Yu:
Cyber Security Threat Intelligence Monitoring and Classification. ISI 2021: 1-3
skipping 5 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-02-17 10:09 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint