Machine Learning for Computer and Cyber Security

BB Gupta, M Sheng - ed: CRC Press. Preface, 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …

Analyzing behavioral big data: methodological, practical, ethical, and moral issues

G Shmueli - Quality Engineering, 2017 - Taylor & Francis
The term “big data” evokes emotions ranging from excitement to exasperation in the
statistics community. Looking beyond these emotions reveals several important changes …

Commenter Behavior Characterization on YouTube Channels

S Shajari, N Agarwal, M Alassad - arXiv preprint arXiv:2304.07681, 2023 - arxiv.org
YouTube is the second most visited website in the world and receives comments from
millions of commenters daily. The comments section acts as a space for discussions among …

Rhetoric Mining: A New Text-Analytics Approach for Quantifying Persuasion

MMH Şeref, O Şeref, AS Abrahams… - … Journal on Data …, 2023 - pubsonline.informs.org
Rhetoric mining is a novel text-analytics method for quantifying persuasion based on
rhetorical analysis theory. Our mixed-methodology approach combines qualitative context …

TRAP: using targeted ads to unveil google personal profiles

M Conti, V Cozza, M Petrocchi… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
In the last decade, the advertisement market spread significantly in the web and mobile app
system. Its effectiveness is also due thanks to the possibility to target the advertisement on …

OSSINT-Open Source Social Network Intelligence: An efficient and effective way to uncover “private” information in OSN profiles

G Cascavilla, F Beato, A Burattin, M Conti… - Online Social Networks …, 2018 - Elsevier
Abstract Online Social Networks (OSNs), such as Facebook, provide users with tools to
share information along with a set of privacy controls preferences to regulate the spread of …

The insider on the outside: a novel system for the detection of information leakers in social networks

G Cascavilla, M Conti, DG Schwartz… - European Journal of …, 2018 - Taylor & Francis
Confidential information is all too easily leaked by naive users posting comments. In this
paper we introduce DUIL, a system for Detecting Unintentional Information Leakers. The …

News censorship in online social networks: A study of circumvention in the commentsphere

DG Schwartz, I Yahav… - Journal of the Association …, 2017 - Wiley Online Library
This study investigates the interplay between online news, reader comments, and social
networks to detect and characterize comments leading to the revelation of censored …

Citizen engagement and the illusion of secrecy: exploring commenter characteristics in censored online news articles

I Yahav, DG Schwartz - Information, Communication & Society, 2018 - Taylor & Francis
We address the conflict between citizenship engagement through news commenting, and
censorship needs. News articles often contain forms of censorship to maintain security, with …

Who framed Roger Reindeer? De-censorship of Facebook posts by snippet classification

F Del Vigna, M Petrocchi, A Tommasi… - Online Social Networks …, 2018 - Elsevier
This paper considers online news censorship and it concentrates on censorship of identities.
Obfuscating identities may occur for disparate reasons, from military to judiciary ones. In the …