A survey on predictions of cyber-attacks utilizing real-time twitter tracing recognition

S Altalhi, A Gutub - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
In recent years, the number of cyber-attacks increased affecting different application types
and targets. Many studies tried to focus on proposing solutions to detect imminent and …

Detecting denial-of-service attacks from social media text: Applying nlp to computer security

N Chambers, B Fry, J McMasters - … of the 2018 Conference of the …, 2018 - aclanthology.org
This paper describes a novel application of NLP models to detect denial of service attacks
using only social media as evidence. Individual networks are often slow in reporting attacks …

Centralized vulnerability database for organization specific automated vulnerabilities discovery and supervision

M ur Rahman, V Deep… - … Conference on Research …, 2016 - ieeexplore.ieee.org
Software Vulnerabilities have been a major concern for enterprises for evaluating
vulnerabilities of their software products. For assessing vulnerabilities there are various sites …

[PDF][PDF] Capsule network for cyberthreat detection

S Altalhi, M Abulkhair, E Alkayal - International Journal of …, 2020 - researchgate.net
In cybersecurity, analyzing social network data has become an essential research area due
to its property of providing real-time updates about real-world events. Studies have shown …

[HTML][HTML] Towards internet scale quality-of-experience measurement with twitter

D Kergl, R Roedler, GD Rodosek - Security of Networks and Services in an …, 2017 - Springer
Abstract At present, Quality of Experience (QoE) measurements are accomplished by
interrogating users for the perceived quality of a service they just have used. Influenced by …

An exploration of future challenges for crowd sourced vulnerability detection

O de Casanove, F Sèdes - THCon 2023 Toulouse Hacking Convention, 2023 - hal.science
Human dimension of cybersecurity falls under different practices or strategies. Crowd
sourcing the detection of vulnerabilities is one of them. A lot of intelligence is published on …

Emerging Security Attack Detection using Capsule Neural Network

SJ Altalhi, M Abulkhair, E Alkayal - 2020 - platform.almanhal.com
In cybersecurity, analyzing social network data has become an essential research area due
to its property of providing real-time updates about real-world events. Studies have shown …

[PDF][PDF] D6. 3—Third Year Report on Automated Configuration and Repair

A Mayzaud, A Sehgal, G Hurel, G Dreo… - Symposium on …, 2015 - cordis.europa.eu
Emerging trends, such as Future Internet, Internet of Things or Internet of Everything pose
new challenges to the network and service management. Due to the increasing complexity …

[引用][C] Profilzuordnung über soziale Netze anhand von Metadaten

R Rödler - Dissertation, Neubiberg, Universität …