Systematic mapping study on security approaches in secure software engineering

RA Khan, SU Khan, HU Khan, M Ilyas - Ieee Access, 2021 - ieeexplore.ieee.org
In the modern digital era, software systems are extensively adapted and have become an
integral component of human society. Such wide use of software systems consists of large …

Text mining in cybersecurity: A systematic literature review

L Ignaczak, G Goldschmidt, CAD Costa… - ACM Computing …, 2021 - dl.acm.org
The growth of data volume has changed cybersecurity activities, demanding a higher level
of automation. In this new cybersecurity landscape, text mining emerged as an alternative to …

The OPM data breach: An investigation of shared emotional reactions on Twitter.

E Bachura, R Valecha, R Chen, HR Rao - MIS quarterly, 2022 - search.ebscohost.com
This paper investigates the shared emotional responses of Twitter users in the aftermath of a
massive data breach, a crisis event known as the Office of Personnel Management (OPM) …

Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system

R Syed - Information & Management, 2020 - Elsevier
Effective vulnerability management requires the integration of vulnerability information
available on multiple sources, including social media. The information could be used to …

inTIME: A Machine Learning-Based Framework for Gathering and Leveraging Web Data to Cyber-Threat Intelligence

P Koloveas, T Chantzios, S Alevizopoulou… - Electronics, 2021 - mdpi.com
In today's world, technology has become deep-rooted and more accessible than ever over a
plethora of different devices and platforms, ranging from company servers and commodity …

Twigma: A dataset of ai-generated images with metadata from twitter

Y Chen, JY Zou - Advances in Neural Information …, 2024 - proceedings.neurips.cc
Recent progress in generative artificial intelligence (gen-AI) has enabled the generation of
photo-realistic and artistically-inspiring photos at a single click, catering to millions of users …

Mentions of security vulnerabilities on reddit, twitter and github

S Horawalavithana, A Bhattacharjee, R Liu… - IEEE/WIC/ACM …, 2019 - dl.acm.org
Activity on social media is seen as a relevant sensor for different aspects of the society. In a
heavily digitized society, security vulnerabilities pose a significant threat that is publicly …

[图书][B] Solving cyber risk: protecting your company and society

A Coburn, E Leverett, G Woo - 2018 - books.google.com
The non-technical handbook for cyber security risk management Solving Cyber Risk distills
a decade of research into a practical framework for cyber security. Blending statistical data …

How do sentiments affect virality on Twitter?

SM Jiménez-Zafra, AJ Sáez-Castillo… - Royal Society …, 2021 - royalsocietypublishing.org
Virality on Twitter is catching the attention of researchers, trying to identify factors which
increase or decrease the probability of retweeting. We study how terms expressing …

Would you please like my tweet?! An artificially intelligent, generative probabilistic, and econometric based system design for popularity-driven tweet content …

MD Garvey, J Samuel, A Pelaez - Decision Support Systems, 2021 - Elsevier
An understudied area in the field of social media research is the design of decision support
systems that can aid the manager by way of automated message component generation …