Harnessing artificial intelligence capabilities to improve cybersecurity

S Zeadally, E Adi, Z Baig, IA Khan - Ieee Access, 2020 - ieeexplore.ieee.org
Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as
the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of …

A taxonomy of network threats and the effect of current datasets on intrusion detection systems

H Hindy, D Brosset, E Bayne, AK Seeam… - IEEE …, 2020 - ieeexplore.ieee.org
As the world moves towards being increasingly dependent on computers and automation,
building secure applications, systems and networks are some of the main challenges faced …

CyberSecurity attack prediction: a deep learning approach

O Ben Fredj, A Mihoub, M Krichen… - … conference on security …, 2020 - dl.acm.org
Cybersecurity attacks are exponentially increasing, making existing detection mechanisms
insufficient and enhancing the necessity to design more relevant prediction models and …

Urldeepdetect: A deep learning approach for detecting malicious urls using semantic vector models

S Afzal, M Asim, AR Javed, MO Beg, T Baker - Journal of Network and …, 2021 - Springer
Abstract Malicious Uniform Resource Locators (URLs) embedded in emails or Twitter posts
have been used as weapons for luring susceptible Internet users into executing malicious …

SimilCatch: Enhanced social spammers detection on twitter using Markov random fields

N El-Mawass, P Honeine, L Vercouter - Information processing & …, 2020 - Elsevier
The problem of social spam detection has been traditionally modeled as a supervised
classification problem. Despite the initial success of this detection approach, later analysis of …

[HTML][HTML] Disrupting drive-by download networks on Twitter

A Javed, R Ikwu, P Burnap, L Giommoni… - Social Network Analysis …, 2022 - Springer
This paper tests disruption strategies in Twitter networks containing malicious URLs used in
drive-by download attacks. Cybercriminals use popular events that attract a large number of …

Marketing analysis of wineries using social collective behavior from users' temporal activity on Twitter

G Bello-Orgaz, RM Mesas, C Zarco, V Rodriguez… - Information Processing …, 2020 - Elsevier
Marketing professionals face challenges of increasing complexity to adapt classic marketing
strategies to the phenomenon of social networks. Companies are currently trying to take …

The weaponization of social media: Spear phishing and cyberattacks on democracy

M Bossetta - Journal of international affairs, 2018 - JSTOR
State-sponsored cyber groups have long utilized spear phishing to pierce government
networks. Spear phishing relies on social engineering to trick individuals into revealing …

Hybrid methodology for analysis of structured and unstructured data to support decision-making in public security

JG Turet, APCS Costa - Data & Knowledge Engineering, 2022 - Elsevier
This work proposes a hybrid methodology that enables the integration of structured and
unstructured data to support the decision-making process in public security contexts. The …

QLLog: A log anomaly detection method based on Q-learning algorithm

X Duan, S Ying, W Yuan, H Cheng, X Yin - Information Processing & …, 2021 - Elsevier
Most of the existing log anomaly detection methods suffer from scalability and numerous
false positives. Besides, they cannot rank the severity level of abnormal events. This paper …