Cybersecurity Research Datasets: Taxonomy and Empirical Analysis
暂无分享,去创建一个
Tyler Moore | Prakash Thapa | Hannah Robbins | Zimo Chai | Muwei Zheng | T. Moore | P. Thapa | Zimo Chai | H. Robbins | Muwei Zheng
[1] Tudor Dumitras,et al. Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits , 2015, USENIX Security Symposium.
[2] Tyler Moore,et al. The consequence of non-cooperation in the fight against phishing , 2008, 2008 eCrime Researchers Summit.
[3] Ross J. Anderson. Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.
[4] Cristina Nita-Rotaru,et al. On the Practicality of Integrity Attacks on Document-Level Sentiment Analysis , 2014, AISec '14.
[5] Frank Breitinger,et al. Availability of datasets for digital forensics - And what is missing , 2017, Digit. Investig..
[6] Elaine Shi,et al. Understanding Craigslist Rental Scams , 2016, Financial Cryptography.
[7] Ewan Klein,et al. Natural Language Processing with Python , 2009 .
[8] J. Alex Halderman,et al. An Internet-Wide View of Internet-Wide Scanning , 2014, USENIX Security Symposium.
[9] Leyla Bilge,et al. Before we knew it: an empirical study of zero-day attacks in the real world , 2012, CCS.
[10] Injong Rhee,et al. Tackling bufferbloat in 3G/4G networks , 2012, Internet Measurement Conference.
[11] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[12] Lawrence A. Gordon,et al. Sharing Information on Computer Systems Security: An Economic Analysis , 2003 .
[13] Aditya Akella,et al. Seeing through Network-Protocol Obfuscation , 2015, CCS.
[14] Nicolas Christin,et al. Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.
[15] Matthew Smith,et al. On the Awareness, Control and Privacy of Shared Photo Metadata , 2014, Financial Cryptography.
[16] Anindya Ghose,et al. The Economic Incentives for Sharing Security Information , 2004, Inf. Syst. Res..
[17] Tyler Moore,et al. Abuse Reporting and the Fight Against Cybercrime , 2017, ACM Comput. Surv..
[18] J. Alex Halderman,et al. Analysis of the HTTPS certificate ecosystem , 2013, Internet Measurement Conference.