


default search action
ISI 2020: Arlington, VA, USA
- IEEE International Conference on Intelligence and Security Informatics, ISI 2020, Arlington, VA, USA, November 9-10, 2020. IEEE 2020, ISBN 978-1-7281-8800-3

- Bingyan Du, Pranay Singhal, Victor A. Benjamin, Weifeng Li

:
Detecting Cyber-Adversarial Videos in Traditional Social media. 1-3 - Kanishk Rana, Rahul Madaan:

Evaluating Effectiveness of Adversarial Examples on State of Art License Plate Recognition Models. 1-3 - David G. Dobolyi

, Ahmed Abbasi
, F. Mariam Zahedi, Anthony Vance
:
An Ordinal Approach to Modeling and Visualizing Phishing Susceptibility. 1-6 - Zhiqing Zhang, Pawissakan Chirupphapa, Hiroshi Esaki, Hideya Ochiai:

XGBoosted Misuse Detection in LAN-Internal Traffic Dataset. 1-6 - Fernanda Oliveira Gomes, Bruno Machado Agostinho, Jean Everson Martina:

Fraud Prevention Within the Brazilian Governmental Public-Key Infrastructure. 1-6 - Antonio Badia

:
Conceptual Models for Counter-Terrorism and Intelligence Knowledge Bases. 1-3 - Matthew Sills, Priyanka Ranade, Sudip Mittal:

Cybersecurity Threat Intelligence Augmentation and Embedding Improvement - A Healthcare Usecase. 1-6 - Rajasekhar Ganduri, Ram Dantu, Mark A. Thompson, Samuel Evans, Logan Widick:

A Human-Network-Security-Interface for an Average Joe. 1-6 - Masashi Kadoguchi, Hanae Kobayashi, Shota Hayashi, Akira Otsuka, Masaki Hashimoto

:
Deep Self-Supervised Clustering of the Dark Web for Cyber Threat Intelligence. 1-6 - Samira Khorshidi

, George O. Mohler, Jeremy G. Carter:
Assessing GAN-based approaches for generative modeling of crime text reports. 1-6 - Gaddisa Olani Ganfure, Chun-Feng Wu

, Yuan-Hao Chang, Wei-Kuan Shih:
DeepGuard: Deep Generative User-behavior Analytics for Ransomware Detection. 1-6 - Syed Hasan Amin Mahmood

, Syed Mustafa Ali Abbasi, Ahmed Abbasi
, Fareed Zaffar:
Phishcasting: Deep Learning for Time Series Forecasting of Phishing Attacks. 1-6 - Rongrong Jing, Hu Tian, Yidi Li, Xingwei Zhang, Xiaolong Zheng, Zhu Zhang, Daniel Zeng:

Improving the Data Quality for Credit Card Fraud Detection. 1-6 - Mustapha Hedabou, Yunusa Simpa Abdulsalam:

Efficient and Secure Implementation of BLS Multisignature Scheme on TPM. 1-6 - Aritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, Tim Finin

:
Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior. 1-6 - Leila Haj Meftah, Rafik Braham:

A virtual simulation environment using deep learning for autonomous vehicles obstacle avoidance. 1-7 - Pu Miao, Hu Tian, Xingwei Zhang, Saike He, Xiaolong Zheng, Desheng Dash Wu, Daniel Zeng:

Analyzing the Evolutionary Characteristics of the Cluster of COVID-19 under Anti-contagion Policies. 1-6 - Joeri G. T. Peters, Floris J. Bex:

Towards a Story Scheme Ontology of Terrorist MOs. 1-6 - Tiago Martins Andrade

, Max Smith-Creasey, Jonathan Francis Roscoe
:
Discerning User Activity in Extended Reality Through Side-Channel Accelerometer Observations. 1-3 - Yonghan Zhu

, Yuqiao Jiang:
The Four-Stages Strategies on Social Media to Cope with "Infodemic" and Repair Public Trust: Covid-19 Disinformation and Effectiveness of Government Intervention in China. 1-5 - Smirti Dwibedi, Medha Pujari, Weiqing Sun:

A Comparative Study on Contemporary Intrusion Detection Datasets for Machine Learning Research. 1-6 - Shuai Wang, Lei Wang, Wenji Mao:

A KG-based Enhancement Framework for Fact Checking Using Category Information. 1-6 - Arnab Bhattacharya, Thiagarajan Ramachandran

, Sandeep Banik, Chase P. Dowling, Shaunak D. Bopardikar:
Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement Learning. 1-6 - Mir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu

, Shouhuai Xu:
Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites. 1-6 - Jan William Johnsen, Katrin Franke:

Identifying Proficient Cybercriminals Through Text and Network Analysis. 1-7 - Maksim Ekin Eren

, Juston S. Moore, Boian S. Alexandrov
:
Multi-Dimensional Anomalous Entity Detection via Poisson Tensor Factorization. 1-6 - Jefferson Viana Fonseca Abreu

, Célia Ghedini Ralha
, João José Costa Gondim:
Twitter Bot Detection with Reduced Feature Set. 1-6 - Nilanjan Sen, Ram Dantu, Mark A. Thompson:

Performance Analysis of Secure Real-time Transport Protocol Using Elliptic Curves. 1-7 - Bibek Upadhayay, Vahid Behzadan:

Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification. 1-6 - Aaron Walker

, Shamik Sengupta:
Malware Family Fingerprinting Through Behavioral Analysis. 1-5 - Andreea-Elena Panait:

Is the user identity perception influenced by the blockchain technology? 1-3 - Fuad Mire Hassan, Mark Lee

:
Political Fake Statement Detection via Multistage Feature-assisted Neural Modeling. 1-6 - Xinglin Xiao, Lei Wang, Qingchao Kong, Wenji Mao:

Social Emotion Cause Extraction from Online Texts. 1-6 - Hashim Abu-gellban

:
A Survey of Real-Time Social-Based Traffic Detection. 1-6 - Fabian Schillinger, Christian Schindelhauer

:
A Proxy-Based Encrypted Online Social Network With Fine-Grained Access. 1-5 - Hanae Kobayashi, Masashi Kadoguchi, Shota Hayashi, Akira Otsuka, Masaki Hashimoto

:
An Expert System for Classifying Harmful Content on the Dark Web. 1-6 - Ning Zhang, Mohammadreza Ebrahimi, Weifeng Li

, Hsinchun Chen:
A Generative Adversarial Learning Framework for Breaking Text-Based CAPTCHA in the Dark Web. 1-6 - Perry Deng, Cooper Linsky, Matthew Wright

:
Weaponizing Unicodes with Deep Learning -Identifying Homoglyphs with Weakly Labeled Data. 1-6 - Mir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu, Shouhuai Xu:

Characterizing the Landscape of COVID-19 Themed Cyberattacks and Defenses. 1-6 - Yizhi Liu, Fang Yu Lin, Zara Ahmad-Post, Mohammadreza Ebrahimi, Ning Zhang, James Lee Hu, Jingyu Xin, Weifeng Li

, Hsinchun Chen:
Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web. 1-6 - Moumita Das Purba, Bill Chu, Ehab Al-Shaer:

From Word Embedding to Cyber-Phrase Embedding: Comparison of Processing Cybersecurity Texts. 1-6 - Jagannadh Vempati, Ram Dantu, Syed Badruddoja

, Mark A. Thompson:
Adaptive and Predictive SDN Control During DDoS Attacks. 1-6 - Ben Lazarine, Sagar Samtani

, Mark W. Patton, Hongyi Zhu
, Steven Ullman
, Benjamin Ampel
, Hsinchun Chen:
Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach. 1-6 - Steven Ullman

, Sagar Samtani
, Ben Lazarine, Hongyi Zhu
, Benjamin Ampel
, Mark W. Patton, Hsinchun Chen:
Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach. 1-6 - Muqeet Ali, Josiah Hagen, Jonathan Oliver:

Scalable Malware Clustering using Multi-Stage Tree Parallelization. 1-6 - Eric Ficke, Shouhuai Xu:

APIN: Automatic Attack Path Identification in Computer Networks. 1-6 - Benjamin Ampel

, Sagar Samtani
, Hongyi Zhu
, Steven Ullman
, Hsinchun Chen:
Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach. 1-6 - Rômulo Almeida, Carla M. Westphall:

Heuristic Phishing Detection and URL Checking Methodology Based on Scraping and Web Crawling. 1-6 - So-Hyun Park, Il-Gu Lee:

Effective Voice Fuzzing Method for Finding Vulnerabilities in AI Speech Recognition Devices. 1-6 - B. Simons, David B. Skillicorn:

A Bootstrapped Model to Detect Abuse and Intent in White Supremacist Corpora. 1-6 - Marcos Rogério Silveira, Adriano Mauro Cansian, Hugo Koji Kobayashi:

Detection of Malicious Domains Using Passive DNS with XGBoost. 1-3

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














