IEEE Intelligence and Security Informatics (ISI) 2018
November 8 - 10, 2018 // Florida International University, Miami FL
ACCEPTED PAPERS
Full Papers
Gael Kamdem De Teyou, Md Ariful Haque, Sachin Shetty and Bheshaj Krishnappa, Cyber Resilience Framework for Industrial Control System: Concepts, Metrics, and Insights.
Mohammed Almukaynizi, Ericsson Marin, Eric Nunes, Paulo Shakarian, Gerardo Simari, Dipsy Kapoor and Timothy Siedlecki, DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks.
Priyanka Ranade, Sudip Mittal, Anupam Joshi and Karuna Joshi, Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence.
Po-Yi Du, Ning Zhang, Mohammadreza Ebrahimi, Sagar Samtani, Ben Lazarine, Nolan Arnold, Rachael Dunn, Sandeep Suntwal, Guadalupe Angeles, Robert Schweitzer and Hsinchun Chen, Identifying, Collecting, and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMs.
David Skillicorn and Christian Leuprecht, Copresence networks.
Jiaqi Liang, Linjing Li, Daniel Zeng and Yunwei Zhao, Correlation-based Dynamics and Systemic Risk Measures in the Cryptocurrency Market.
Johan Fernquist, Lisa Kaati and Ralph Schroeder, Political Bots and the Swedish General Election.
Richard Frank, Myfanwy Thomson, Alexander Mikhaylov and Andrew Park, Putting all eggs in a single basket: A cross-community analysis of 12 hacking forums.
Jack Hogan and Niall Adams, A Study of Data Fusion for Predicting Novel Activity in Enterprise Cyber-Security.
Antonio Badia, A Broker Architecture, Push-Pull Database System for Intelligence Analysis.
Mohammadreza Ebrahimi, Mihai Surdeanu, Sagar Samtani and Hsinchun Chen, Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning Approach (Best Paper Award Candidate).
Shridatt Sugrim, Sridhar Venkatesan, Jason Youzwak, Cho-Yu Chiang, Ritu Chadha, Massimiliano Albanese and Hasan Cam, Measuring the Effectiveness of Network Deception.
Christopher Harrell, Sagar Samtani, Mark Patton and Hsinchun Chen, Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions.
Ryan Williams, Sagar Samtani, Mark Patton and Hsinchun Chen, Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study.
Elizabeth Riddle-Workman, Marina Evangelou and Niall Adams, Adaptive Anomaly Detection on Network Data Streams.
Othmane Cherqi, Ghita Mezzour, Mounir Ghogho and Mohammed El Koutbi, Analysis of Hacking Related Trade in the Darkweb.
Mayank Verma, Ponnurangam Kumarguru, Shuva Brata Deb and Anuradha Gupta, Analysing Indicator of Compromises for Ransomware: Leveraging IOCs with Machine Learning Techniques.
Gordon Werner, S. Jay Yang and Katie Mcconky, Leveraging Intra-Day Temporal Variations to Predict Daily Cyberattack Activity.
Lorenzo Neil, Sudip Mittal and Anupam Joshi, Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports.
Arya Renjan, Karuna Pande Joshi, Sandeep Nair Narayanan and Anupam Joshi, DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection.
Zhiyuan Li, Weijia Xing and Dianxiang Xu, Detecting Saturation Attacks in Software-Defined Networks.
Hamidreza Alvari, Elham Shaabani and Paulo Shakarian, Early Identification of Pathogenic Social Media Accounts.
Mehdi Zakroum, Abdellah Houmz, Mounir Ghogho, Ghita Mezzour, Jérôme François, Abdelkader Lahmadi and Mohammed El Koutbi, Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates.
Fernanda Oliveira Gomes, Douglas Simões Silva, Bruno Machado Agostinho and Jean Everson Martina, Privacy Preserving on Trajectories Created by Wi-Fi Connections in a University Campus.
Lida Huang, Guoray Cai, Hongyong Yuan and Jianguo Chen, From Public Gatherings to the Burst of Collective Violence: An Agent-based Emotion Contagion Model.
Ghaith Husari, Xi Niu, Bei-Tseng Chu and Ehab Al-Shaer, Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence.
Markus Heinrich, Jannik Vieten, Tolga Arul and Stefan Katzenbeisser, Security Analysis of the RaSTA Safety Protocol.
Emma Mcmahon, Mark Patton, Hsinchun Chen and Sagar Samtani, Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency.
Stephen Moskal, Shanchieh Yang and Michael Kuhl, Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts.
Björn Pelzer, Lisa Kaati and Nazar Akrami, Directed Digital Hate.
Guandan Chen, Qingchao Kong and Wenji Mao, A Partition and Interaction Combined Popularity Prediction Model for Social Media Events.
Guandan Chen and Wenji Mao, Event Detection for Social Media by Joint Learning with Keyword Extraction.
Mônica Silva, Jose Viterbo, Flavia Bernardini and Cristiano Maciel, Identifying Privacy Functional Requirements for Crowdsourcing Applications in Smart Cities.
Amirreza Niakanlahiji, Bei-Tseng Chu and Ehab Al-Shaer, PhishMon: A Machine Learning Framework for Detecting Phishing Webpages.
Maede Zolanvari, Marcio Teixeira and Raj Jain, Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning.
Brian Ricks, Bhavani Thuraisingham and Patrick Tague, Lifting the Smokescreen: Detecting Underlying Anomalies During a DDoS Attack (Best Paper Award Candidate).
Aswin Krishna Gunasekaran, Maryam Bahojb Imani, Latifur Khan, Christan Grant, Patrick T. Brandt and Jennifer S. Holmes, SPERG: Scalable Political Event Report Geoparsing in Big Data.
Mohammad Tayebi, Hamed Yaghoubi Shahir, Uwe Glässer and Patricia Brantingham, Spatial Patterns of Offender Groups.
Short Papers
Cuneyt Gurcan Akcora, Jonathan Z. Bakdash, Yulia R. Gel, Laura Marusich, Murat Kantarcioglu and Bhavani Thuraisingham, Attacklets: Modeling High Dimensionality in Real World Cyberattacks.
Yifan Huang, Wingyan Chung and Xinlin Tang, A Temporal Recurrent Neural Network Approach to Detecting Market Anomaly Attacks.
Zikang Wang, Linjing Li and Daniel Zeng, Attention-based Multi-hop Reasoning for Knowledge Graph.
Ritika Pandey and George Mohler, Evaluation of crime topic models: topic coherence vs spatial crime concentration.
Mohammed Almukaynizi, Vivin Paliath, Malay Shah, Malav Shah and Paulo Shakarian, Finding Cryptocurrency Attack Indicators Using Temporal Logic and Darkweb Data.
Wingyan Chung, Jinwei Liu, Xinlin Tang and Vincent Lai, Extracting Textual Features of Financial Social Media to Detect Cognitive Hacking.