C Liu, Y Xiao, V Javangula, Q Hu… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT)-based E-commerce is a new business model that relies on autonomous transaction management on IoT-devices. The management system toward IoT …
Organizations depend on heavy use of various cyber defense technologies, including intrusion detection and prevention systems, to monitor and protect networks and devices …
S Samtani, H Zhu, H Chen - ACM Transactions on Privacy and Security …, 2020 - dl.acm.org
Cybersecurity experts have appraised the total global cost of malicious hacking activities to be $450 billion annually. Cyber Threat Intelligence (CTI) has emerged as a viable approach …
Fringe groups and organizations have a long history of using euphemisms—ordinary- sounding words with a secret meaning—to conceal what they are discussing. Nowadays …
When a domain is registered, information about the registrants and other related personnel is recorded by WHOIS databases owned by registrars or registries (called WHOIS providers …
Y Ding, N Luktarhan, K Li, W Slamu - computers & security, 2019 - Elsevier
In this paper, the Search & Heuristic Rule & Logistic Regression (SHLR) combination detection method is proposed for detecting the obfuscation techniques commonly used by …
Underground communication is invaluable for understanding cybercrimes. However, it is often obfuscated by the extensive use of dark jargons, innocently-looking terms like …
W Zhu, S Bhat - arXiv preprint arXiv:2109.04666, 2021 - arxiv.org
It is a well-known approach for fringe groups and organizations to use euphemisms-- ordinary-sounding and innocent-looking words with a secret meaning--to conceal what they …
The popularity of online gambling could bring negative social impact, and many countries ban or restrict online gambling. Taking China for example, online gambling violates Chinese …