Darkweb Cyber Threat Intelligence Mining
暂无分享,去创建一个
Ahmad Diab | Paulo Shakarian | John Robertson | Ericsson Marin | Jana Shakarian | Eric Nunes | Vivin Paliath | P. Shakarian | John Robertson | E. Marin | Eric Nunes | Vivin Paliath | J. Shakarian | Ahmad Diab | Jana Shakarian
[1] R. Kozinets. Netnography: Doing Ethnographic Research Online , 2009 .
[2] Véronique Cortier,et al. Measuring vote privacy, revisited , 2012, CCS.
[3] John Liederbach,et al. Digital Crime and Digital Terrorism , 2005 .
[4] Paulo Shakarian,et al. The 2008 Russian Cyber Campaign against Georgia , 2011 .
[5] Harry Eugene Stanley,et al. The cost of attack in competing networks , 2015, Journal of The Royal Society Interface.
[6] Martin C. Libicki,et al. Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar , 2014 .
[7] Tom Boellstorff. Coming of Age in Second Life: An Anthropologist Explores the Virtually Human , 2008 .
[8] Andrea Locatelli. The Offense/Defense Balance in Cyberspace , 2013 .
[9] Paul A. Taylor,et al. From hackers to hacktivists: speed bumps on the global superhighway? , 2005, New Media Soc..
[10] Thomas J. Holt. Crime On-line: Correlates, Causes, and Context , 2010 .
[11] Hsinchun Chen,et al. Identifying Top Sellers In Underground Economy Using Deep Learning-Based Sentiment Analysis , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.
[12] Roberto Nardone,et al. Vulnerability modeling and analysis for critical infrastructure protection applications , 2013, Int. J. Crit. Infrastructure Prot..
[13] Thomas J. Holt,et al. Examining the social networks of malware writers and hackers , 2012 .
[14] Peter Holtz,et al. Analyzing Internet Forums , 2012, J. Media Psychol. Theor. Methods Appl..
[15] David Harris,et al. Engineering Psychology and Cognitive Ergonomics , 2014, Lecture Notes in Computer Science.
[16] William J. Lynn,et al. Defending a New Domain: The Pentagon's Cyberstrategy , 2010 .
[17] M. L. Fisher,et al. An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..
[18] Siddharth Sridhar,et al. Model-Based Attack Detection and Mitigation for Automatic Generation Control , 2014, IEEE Transactions on Smart Grid.
[19] Hsinchun Chen. Dark Web: Exploring and Data Mining the Dark Side of the Web , 2011 .
[20] Jeffrey Carr,et al. Inside Cyber Warfare: Mapping the Cyber Underworld , 2009 .
[21] D. Wall. Cybercrime: The Transformation of Crime in the Information Age , 2007 .
[22] Neil D. Lawrence,et al. Deterministic and Statistical Methods in Machine Learning, First International Workshop, Sheffield, UK, September 7-10, 2004, Revised Lectures , 2005, Deterministic and Statistical Methods in Machine Learning.
[23] Ahmad Diab,et al. Product offerings in malicious hacker markets , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).
[24] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .
[25] Keshnee Padayachee,et al. A survey of honeypot research: Trends and opportunities , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[26] John Yen,et al. Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis , 2007, KDD 2007.
[27] Hsinchun Chen,et al. Uncovering the dark Web: A case study of Jihad on the Web , 2008 .
[28] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[29] Avrim Blum,et al. Planning in the Presence of Cost Functions Controlled by an Adversary , 2003, ICML.
[30] E. G. Coleman,et al. Coding Freedom: The Ethics and Aesthetics of Hacking , 2012 .
[31] Steven Levy,et al. Hackers: Heroes of the Computer Revolution , 1984 .
[32] Paulo Shakarian,et al. Introduction to Cyber-Warfare: A Multidisciplinary Approach , 2013 .
[33] Michael I. Jordan,et al. Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..
[34] Kevin F. Steinmetz. Craft(y)ness An Ethnographic Study of Hacking , 2015 .
[35] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[36] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[37] Filippo Menczer,et al. Topical web crawlers: Evaluating adaptive algorithms , 2004, TOIT.
[38] Jeannette M. Wing,et al. Game strategies in network security , 2005, International Journal of Information Security.
[39] B. Loader,et al. Cyberprotest: New Media, Citizens and Social Movements , 2004 .
[40] Sushil Jajodia,et al. Moving Target Defense II , 2013, Advances in Information Security.
[41] Yossi Azar,et al. Efficient Submodular Function Maximization under Linear Packing Constraints , 2012, ICALP.
[42] Sushil Jajodia,et al. Cyber Warfare: Building the Scientific Foundation , 2015 .
[43] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[44] Dana S. Nau,et al. Evolution of state-dependent risk preferences , 2010, TIST.
[45] Sherry Turkle,et al. The second self: computers and the human spirit , 1984 .
[46] Martin van den Berg,et al. Focused Crawling: A New Approach to Topic-Specific Web Resource Discovery , 1999, Comput. Networks.
[47] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[48] H. Bernard,et al. Handbook of Methods in Cultural Anthropology , 2000 .
[49] J. Juris. Reflections on #Occupy Everywhere: Social media, public space, and emerging logics of aggregation , 2012 .
[50] William M. Rand,et al. Objective Criteria for the Evaluation of Clustering Methods , 1971 .
[51] Katarzyna Musial-Gabrys,et al. Hybrid structure-based link prediction model , 2016, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[52] Hsinchun Chen,et al. A focused crawler for Dark Web forums , 2010 .
[53] Frank Schmalleger,et al. Crimes of the Internet , 2008 .
[54] Danny Bradbury,et al. Unveiling the dark web , 2014, Netw. Secur..
[55] T. Holt,et al. A Crime Script Analysis of the Online Stolen Data Market , 2015 .