The future of false information detection on social media: New perspectives and trends

B Guo, Y Ding, L Yao, Y Liang, Z Yu - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
The massive spread of false information on social media has become a global risk, implicitly
influencing public opinion and threatening social/political development. False information …

Security data collection and data analytics in the internet: A survey

X Jing, Z Yan, W Pedrycz - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Attacks over the Internet are becoming more and more complex and sophisticated. How to
detect security threats and measure the security of the Internet arises a significant research …

[图书][B] Computer security: principles and practice

W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …

A survey on bio-inspired networking

F Dressler, OB Akan - Computer networks, 2010 - Elsevier
The developments in the communication and networking technologies have yielded many
existing and envisioned information network architectures such as cognitive radio networks …

Delving into internet DDoS attacks by botnets: characterization and analysis

A Wang, W Chang, S Chen… - IEEE/ACM Transactions …, 2018 - ieeexplore.ieee.org
Internet distributed denial of service (DDoS) attacks are prevalent but hard to defend
against, partially due to the volatility of the attacking methods and patterns used by attackers …

Behavioral detection of malware on mobile handsets

A Bose, X Hu, KG Shin, T Park - … of the 6th international conference on …, 2008 - dl.acm.org
A novel behavioral detection framework is proposed to detect mobile worms, viruses and
Trojans, instead of the signature-based solutions currently available for use in mobile …

[HTML][HTML] SEIQRS model for the transmission of malicious objects in computer network

BK Mishra, N Jha - Applied Mathematical Modelling, 2010 - Elsevier
Susceptible (S)–exposed (E)–infectious (I)–quarantined (Q)–recovered (R) model for the
transmission of malicious objects in computer network is formulated. Thresholds, equilibria …

[图书][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

Dynamic model of worms with vertical transmission in computer network

BK Mishra, SK Pandey - Applied mathematics and computation, 2011 - Elsevier
An e-epidemic SEIRS model for the transmission of worms in computer network through
vertical transmission is formulated. It has been observed that if the basic reproduction …

Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization

C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …