Cybersecurity as an Industry: A Cyber Threat Intelligence Perspective

[1]  Hsinchun Chen,et al.  DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics , 2019, MIS Q..

[2]  Jay F. Nunamaker,et al.  Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence , 2017, J. Manag. Inf. Syst..

[3]  Hsinchun Chen,et al.  Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).

[4]  Jay F. Nunamaker,et al.  Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System , 2016, J. Manag. Inf. Syst..

[5]  Hsinchun Chen,et al.  Using social network analysis to identify key hackers for keylogging tools in hacker forums , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).

[6]  Hsinchun Chen,et al.  Targeting key data breach services in underground supply chain , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).

[7]  Hsinchun Chen,et al.  AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).

[8]  Bin Zhang,et al.  Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities , 2016, J. Manag. Inf. Syst..

[9]  Hsinchun Chen,et al.  Exploring hacker assets in underground forums , 2015, 2015 IEEE International Conference on Intelligence and Security Informatics (ISI).

[10]  Hsinchun Chen,et al.  Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops , 2015, 2015 IEEE International Conference on Intelligence and Security Informatics (ISI).

[11]  Hsinchun Chen,et al.  Identifying Top Sellers In Underground Economy Using Deep Learning-Based Sentiment Analysis , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.

[12]  Hsinchun Chen,et al.  Machine learning for attack vector identification in malicious source code , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.

[13]  Weifeng Li,et al.  Towards Secure and Trustworthy Cyberspace: Social Media Analytics on Hacker Communities , 2017 .

[14]  Victor A. Benjamin,et al.  Securing Cyberspace: Analyzing Cybercriminal Communities through Web and Text Mining Perspectives , 2016 .