


default search action
ISI 2021: San Antonio, TX, USA
- IEEE International Conference on Intelligence and Security Informatics, ISI 2021, San Antonio, TX, USA, November 2-3, 2021. IEEE 2021, ISBN 978-1-6654-3838-4

- Abdulrahman Aldkheel

, Lina Zhou, Kanlun Wang:
Characterization of Domestic Violence through Self-disclosure in Social Media: A Case Study of the Time of COVID-19. 1-3 - Othmane Cherqi, Hicham Hammouchi

, Mounir Ghogho, Houda Benbrahim
:
Leveraging Open Threat Exchange (OTX) to Understand Spatio-Temporal Trends of Cyber Threats: Covid-19 Case Study. 1-6 - Yizhi Liu, Fang Yu Lin, Mohammadreza Ebrahimi, Weifeng Li

, Hsinchun Chen:
Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach. 1-6 - Zizhen Deng, Xiaolong Zheng, Zifan Ye, Zhen Cai, Daniel Dajun Zeng:

Credible Influence Analysis in Mass Media Using Causal Inference. 1-5 - Maria Valero, Lei Li, Hossain Shahriar

, Shahriar Sobhan, Michael Steven Handlin, Jinghua Zhang:
Emotional Analysis of Learning Cybersecurity with Games. 1-6 - Zhiyuan Ding, Victor A. Benjamin, Weifeng Li

, Xueyan Yin
:
Exploring Differences Among Darknet and Surface Internet Hacking Communities. 1-3 - Yuan Tian, Nan Xu, Wenji Mao, Yin Luo:

A Central Opinion Extraction Framework for Boosting Performance on Sentiment Analysis. 1-6 - Brett A. Jefferson

, Natalie C. Heller, Joseph A. Cottam, Nhuy Van, George Chin:
The Utility in Conjoint Analysis as a Fast Expert Elicitation Technique. 1-6 - Lauren Maunder, Joshua Lyons, Lauren Anderson, Joe Harrison

, Brian Timana-Gomez, Paul O'Donnell, Kiernan B. George, Alan J. Michaels:
Identifying Corporate Political Trends Online. 1-6 - Haoda Qian, Liping Chen, Qiwen Zha:

Mining User's Opinion Towards the Rising and Falling Trends of the Stock Market: A Hybrid Model. 1-3 - Sai Sree Laya Chukkapalli, Nisha Pillai, Sudip Mittal, Anupam Joshi:

Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase. 1-6 - Lina Zhou, Kanlun Wang, Jianwei Lai

, Dongsong Zhang:
Behaviors of Unwarranted Password Identification via Shoulder-Surfing during Mobile Authentication. 1-3 - Jalal Ghadermazi, Soumyadeep Hore, Dinesh Sharma, Ankit Shah:

Adversarial Deep Reinforcement Learning Enabled Threat Analytics Framework for Constrained Spatio-Temporal Movement Intelligence Data. 1-6 - Stefano Z. Stamato, Andrew J. Park, Brian Eng, Valerie Spicer, Herbert H. Tsang

, D. Kim Rossmo:
Differences in Geographic Profiles When Using Street Routing Versus Manhattan Distances in Buffer Zone Radii Calculations. 1-6 - Jaewan Lim

, Lina Zhou, Dongsong Zhang:
Verbal Deception Cue Training for the Detection of Phishing Emails. 1-3 - Bo-Xiang Wang, Jiann-Liang Chen, Chiao-Lin Yu:

Cyber Security Threat Intelligence Monitoring and Classification. 1-3 - Xingwei Zhang, Xiaolong Zheng, Wenji Mao:

Attacking DNN-based Cross-modal Retrieval Hashing Framework with Adversarial Perturbations. 1-6 - Rayah Al-Qurashi, Ahmed Aleroud, Ahmad A. Saifan, Mohammad Alsmadi, Izzat Alsmadi:

Generating Optimal Attack Paths in Generative Adversarial Phishing. 1-6 - Avishek Bose, Shreya Gopal Sundari, Vahid Behzadan, William H. Hsu:

Tracing Relevant Twitter Accounts Active in Cyber Threat Intelligence Domain by Exploiting Content and Structure of Twitter Network. 1-6 - Moojan Pordelkhaki, Shereen Fouad

, Mark B. Josephs
:
Intrusion Detection for Industrial Control Systems by Machine Learning using Privileged Information. 1-6 - Tala Vahedi

, Benjamin Ampel
, Sagar Samtani
, Hsinchun Chen:
Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach. 1-6 - Martin Husák:

Towards a Data-Driven Recommender System for Handling Ransomware and Similar Incidents. 1-6 - Vishnuvardhan V. Iyer, Meizhi Wang

, Jaydeep Kulkarni, Ali E. Yilmaz:
A Systematic Evaluation of EM and Power Side-Channel Analysis Attacks on AES Implementations. 1-6 - James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen:

Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach. 1-6 - Hanxuan Yang, Qingchao Kong, Wenji Mao, Lei Wang:

Boosting Hidden Graph Node Classification for Large Social Networks. 1-6 - Marek Sikora, Radek Fujdiak, Jiri Misurec:

Analysis and detection of application-independent slow Denial of Service cyber attacks. 1-6 - Jaime D. Acevedo-Viloria, Sebastián Soriano Pérez, Jesus Solano, David Zarruk-Valencia, Fernando G. Paulin, Alejandro Correa Bahnsen:

Feature-Level Fusion of Super-App and Telecommunication Alternative Data Sources for Credit Card Fraud Detection. 1-6 - Joe Harrison

, Joshua Lyons, Lauren Anderson, Lauren Maunder, Paul O'Donnell, Kiernan B. George, Alan J. Michaels:
Quantifying Use and Abuse of Personal Information. 1-6 - Ying Sun, Qingchao Kong, Luwen Huangfu, Jin Pan:

Domain-oriented News Recommendation in Security Applications. 1-6 - Yunrong Yang, Zhidong Cao, Pengfei Zhao, Daniel Dajun Zeng, Qingpeng Zhang

, Yin Luo:
Extracting Impacts of Non-pharmacological Interventions for COVID-19 From Modelling Study. 1-6 - Tianyi Luo, Zhidong Cao, Pengfei Zhao, Daniel Dajun Zeng, Qingpeng Zhang

:
Evaluating the Impact of Vaccination on COVID-19 Pandemic Used a Hierarchical Weighted Contact Network Model. 1-6 - Kaeli Otto, Benjamin Ampel

, Sagar Samtani
, Hongyi Zhu
, Hsinchun Chen:
Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach. 1-6 - Benjamin Ampel

, Hsinchun Chen:
Distilling Contextual Embeddings Into A Static Word Embedding For Improving Hacker Forum Analytics. 1-3 - Rebecca Jones, Daniel Fortin, Samrat Chatterjee, Dennis G. Thomas, Lisa Newburn:

User Role Identification in Software Vulnerability Discussions over Social Networks. 1-3

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














