Data-driven cybersecurity incident prediction: A survey

N Sun, J Zhang, P Rimba, S Gao… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
Driven by the increasing scale and high profile cybersecurity incidents related public data,
recent years we have witnessed a paradigm shift in understanding and defending against …

NormaChain: A blockchain-based normalized autonomous transaction settlement system for IoT-based E-commerce

C Liu, Y Xiao, V Javangula, Q Hu… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT)-based E-commerce is a new business model that relies on
autonomous transaction management on IoT-devices. The management system toward IoT …

FAIXID: A framework for enhancing AI explainability of intrusion detection results using data cleaning techniques

H Liu, C Zhong, A Alnusair, SR Islam - Journal of network and systems …, 2021 - Springer
Organizations depend on heavy use of various cyber defense technologies, including
intrusion detection and prevention systems, to monitor and protect networks and devices …

Proactively identifying emerging hacker threats from the dark web: A diachronic graph embedding framework (d-gef)

S Samtani, H Zhu, H Chen - ACM Transactions on Privacy and Security …, 2020 - dl.acm.org
Cybersecurity experts have appraised the total global cost of malicious hacking activities to
be $450 billion annually. Cyber Threat Intelligence (CTI) has emerged as a viable approach …

Self-supervised euphemism detection and identification for content moderation

W Zhu, H Gong, R Bansal, Z Weinberg… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Fringe groups and organizations have a long history of using euphemisms—ordinary-
sounding words with a secret meaning—to conceal what they are discussing. Nowadays …

[PDF][PDF] From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.

C Lu, B Liu, Y Zhang, Z Li, F Zhang, H Duan, Y Liu… - NDSS, 2021 - utdallas.edu
When a domain is registered, information about the registrants and other related personnel
is recorded by WHOIS databases owned by registrars or registries (called WHOIS providers …

A keyword-based combination approach for detecting phishing webpages

Y Ding, N Luktarhan, K Li, W Slamu - computers & security, 2019 - Elsevier
In this paper, the Search & Heuristic Rule & Logistic Regression (SHLR) combination
detection method is proposed for detecting the obfuscation techniques commonly used by …

Reading thieves' cant: automatically identifying and understanding dark jargons from cybercrime marketplaces

K Yuan, H Lu, X Liao, XF Wang - 27th USENIX Security Symposium …, 2018 - usenix.org
Underground communication is invaluable for understanding cybercrimes. However, it is
often obfuscated by the extensive use of dark jargons, innocently-looking terms like …

Euphemistic phrase detection by masked language model

W Zhu, S Bhat - arXiv preprint arXiv:2109.04666, 2021 - arxiv.org
It is a well-known approach for fringe groups and organizations to use euphemisms--
ordinary-sounding and innocent-looking words with a secret meaning--to conceal what they …

Casino royale: a deep exploration of illegal online gambling

H Yang, K Du, Y Zhang, S Hao, Z Li, M Liu… - Proceedings of the 35th …, 2019 - dl.acm.org
The popularity of online gambling could bring negative social impact, and many countries
ban or restrict online gambling. Taking China for example, online gambling violates Chinese …