Detecting offensive language in social media to protect adolescent online safety

Y Chen, Y Zhou, S Zhu, H Xu - … security, risk and trust and 2012 …, 2012 - ieeexplore.ieee.org
Since the textual contents on online social media are highly unstructured, informal, and often
misspelled, existing research on message-level offensive language detection cannot …

Blocis: blockchain-based cyber threat intelligence sharing framework for sybil-resistance

S Gong, C Lee - Electronics, 2020 - mdpi.com
The convergence of fifth-generation (5G) communication and the Internet-of-Things (IoT) has
dramatically increased the diversity and complexity of the network. This change diversifies …

Formulating a response to a natural language query based on user intent

WG Dubyak, V Gandikota, P Sakthi - US Patent 10,803,255, 2020 - Google Patents
Natural language processing is enhanced by linguistically extracting intelligence about a
user. A history of user queries is analyzed by a natural language classifier to determine …

Semantic analysis for information and communication threats detection of online service users

S Fedushko, E Benova - Procedia Computer Science, 2019 - Elsevier
This paper deal with the actual task of semantic analysis for information and communication
threats detection of online service users. The increasing popularity of new Internet …

Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence

DS Punithavathani, K Sujatha, JM Jain - Cluster Computing, 2015 - Springer
The Insider threat is minimally addressed by current information security practices, yet the
insider poses the most serious threat to organization through various malicious activities …

Automated event and social network extraction from digital evidence sources with ontological mapping

B Turnbull, S Randhawa - Digital Investigation, 2015 - Elsevier
The sharp rise in consumer computing, electronic and mobile devices and data volumes has
resulted in increased workloads for digital forensic investigators and analysts. The number …

Using PLSI-U to detect insider threats by datamining e-mail

JS Okolica, GL Peterson… - International Journal of …, 2008 - inderscienceonline.com
Despite a technology bias that focuses on external electronic threats, insiders pose the
greatest threat to an organisation. This paper discusses an approach to assist investigators …

Intelligence analyses and the insider threat

E Santos, H Nguyen, F Yu, KJ Kim, D Li… - … on Systems, Man …, 2011 - ieeexplore.ieee.org
In the intelligence community, the existence of a malicious insider poses a severe threat to
information, to the actual analytic process, and, ultimately, to any decision-making process …

Insider threat detection using situation-aware MAS

JF Buford, L Lewis, G Jakobson - 2008 11th International …, 2008 - ieeexplore.ieee.org
Previous work in automating insider threat detection has included top-down analysis and
fusion of events from network and system monitors. Situation-awareness can extend the …

[PDF][PDF] System dynamics based insider threats modeling

SC Yang, YL Wang - International Journal of Network Security and its …, 2011 - Citeseer
Insider threat has been recognized as one of the most dangerous security threats and
become a much more complex issue. Insider threat is resulted from the legitimate users …