Cybersecurity as an Industry: A Cyber Threat Intelligence Perspective
暂无分享,去创建一个
[1] Hsinchun Chen,et al. DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics , 2019, MIS Q..
[2] Jay F. Nunamaker,et al. Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence , 2017, J. Manag. Inf. Syst..
[3] Hsinchun Chen,et al. Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).
[4] Jay F. Nunamaker,et al. Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System , 2016, J. Manag. Inf. Syst..
[5] Hsinchun Chen,et al. Using social network analysis to identify key hackers for keylogging tools in hacker forums , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).
[6] Hsinchun Chen,et al. Targeting key data breach services in underground supply chain , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).
[7] Hsinchun Chen,et al. AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).
[8] Bin Zhang,et al. Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities , 2016, J. Manag. Inf. Syst..
[9] Hsinchun Chen,et al. Exploring hacker assets in underground forums , 2015, 2015 IEEE International Conference on Intelligence and Security Informatics (ISI).
[10] Hsinchun Chen,et al. Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops , 2015, 2015 IEEE International Conference on Intelligence and Security Informatics (ISI).
[11] Hsinchun Chen,et al. Identifying Top Sellers In Underground Economy Using Deep Learning-Based Sentiment Analysis , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.
[12] Hsinchun Chen,et al. Machine learning for attack vector identification in malicious source code , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.
[13] Weifeng Li,et al. Towards Secure and Trustworthy Cyberspace: Social Media Analytics on Hacker Communities , 2017 .
[14] Victor A. Benjamin,et al. Securing Cyberspace: Analyzing Cybercriminal Communities through Web and Text Mining Perspectives , 2016 .