The growth of data volume has changed cybersecurity activities, demanding a higher level of automation. In this new cybersecurity landscape, text mining emerged as an alternative to …
This paper investigates the shared emotional responses of Twitter users in the aftermath of a massive data breach, a crisis event known as the Office of Personnel Management (OPM) …
R Syed - Information & Management, 2020 - Elsevier
Effective vulnerability management requires the integration of vulnerability information available on multiple sources, including social media. The information could be used to …
In today's world, technology has become deep-rooted and more accessible than ever over a plethora of different devices and platforms, ranging from company servers and commodity …
Y Chen, JY Zou - Advances in Neural Information …, 2024 - proceedings.neurips.cc
Recent progress in generative artificial intelligence (gen-AI) has enabled the generation of photo-realistic and artistically-inspiring photos at a single click, catering to millions of users …
Activity on social media is seen as a relevant sensor for different aspects of the society. In a heavily digitized society, security vulnerabilities pose a significant threat that is publicly …
A Coburn, E Leverett, G Woo - 2018 - books.google.com
The non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber security. Blending statistical data …
Virality on Twitter is catching the attention of researchers, trying to identify factors which increase or decrease the probability of retweeting. We study how terms expressing …
An understudied area in the field of social media research is the design of decision support systems that can aid the manager by way of automated message component generation …