


default search action
ISI 2023: Charlotte, NC, USA
- IEEE International Conference on Intelligence and Security Informatics, ISI 2023, Charlotte, NC, USA, October 2-3, 2023. IEEE 2023, ISBN 979-8-3503-3773-0

- Joshua Bolton, Lavanya Elluri

, Karuna Pande Joshi:
An Overview of Cybersecurity Knowledge Graphs Mapped to the MITRE ATT&CK Framework Domains. 1-6 - Yilin Wu, Minjie Yuan, Yuxuan Song, Liping Chen, Chenyu Yuan, Qiudan Li:

A Two-Stage Prompt Learning Method for Jointly Predicting Topic and Personality. 1-3 - Maryam Issakhani, Mufeng Huang, Mohammad A. Tayebi, Arash Habibi Lashkari:

An Evolutionary Algorithm for Adversarial SQL Injection Attack Generation. 1-6 - Hanyi Zou, Nan Xu, Qingchao Kong, Wenji Mao:

Controllable News Comment Generation based on Attribute Level Contrastive Learning. 1-6 - Fan Yang, Jie Bai, Linjing Li, Daniel Zeng:

A Continual Learning Framework for Event Prediction with Temporal Knowledge Graphs. 1-6 - Wingyan Chung:

Building Human Digital Twins: Cases for Intelligence and Security Informatics. 1-3 - Chunmiao Yu, Zhidong Cao, Pengfei Zhao, Daniel Dajun Zeng, Tianyi Luo, Jiaojiao Wang:

Named Entity Recognition for Epidemiological Investigation in COVID-19. 1-6 - Nilanjana Das, Anantaa Kotal, Daniel Roseberry, Anupam Joshi:

Change Management using Generative Modeling on Digital Twins. 1-6 - Lina Zhou, Dongsong Zhang, Zhihui Liu:

A Stage Model for Understanding Phishing Victimization Behavior in Embedded Training. 1-6 - Moumita Das Purba, Bill Chu:

Extracting Actionable Cyber Threat Intelligence from Twitter Stream. 1-6 - Colman McGuan, Chansu Yu, Qin Lin:

Towards Low-Barrier Cybersecurity Research and Education for Industrial Control Systems. 1-6 - Wei Tang, Qingchao Kong, Yin Luo, Wenji Mao:

Neuro-Logic Learning for Relation Reasoning over Event Knowledge Graph. 1-6 - Maksim Ekin Eren, Manish Bhattarai, Kim Ø. Rasmussen, Boian S. Alexandrov

, Charles Nicholas:
MalwareDNA: Simultaneous Classification of Malware, Malware Families, and Novel Malware. 1-3 - Kanlun Wang, Lina Zhou, Dongsong Zhang, Jianwei Lai

:
Shoulder Surfing on Mobile Authentication: Perception vis-a-vis Performance from the Attacker's Perspective. 1-6 - Alexander I-Chi Lai, Hung-Chih Yang:

Deep Learning Based Behavior Anomaly Detection within the Context of Electronic Commerce. 1-6 - Abdullah Bani Melhem, Ahmed Aleroud, Zain A. Halloush

:
AI-based MultiModal to Identify State-linked Social Media Accounts in the Middle East: A Study on Twitter. 1-6 - Jiakai Geng, Chenyang Zhang, Linjing Li, Qing Yang, Daniel Dajun Zeng:

PCEN: Potential Correlation-Enhanced Network for Multimodal Named Entity Recognition. 1-6 - Maria Patrizia Carello, Alberto Marchetti-Spaccamela

, Leonardo Querzoni, Marco Angelini:
SoK: Cybersecurity Regulations, Standards and Guidelines for the Healthcare Sector. 1-6 - Sherief Hashima

, Mohamed H. Saad
, Kohei Hatano, Hamada Rizk
:
Vehicle Classification in Intelligent Transportation Systems Using Deep Learning and Seismic Data. 1-6 - Weiguang Zhang, Saike He, Peijie Zhang, Daniel Dajun Zeng:

Dynamic Causal Modelling and Predictive Analysis for the COVID-19 Pandemic. 1-6 - Minzheng Wang, Jia Cao, Qingchao Kong, Yin Luo:

Boosting Domain-Specific Question Answering Through Weakly Supervised Self-Training. 1-6 - Zahra Khanjani, Lavon Davis, Anna Tuz, Kifekachukwu Nwosu, Christine Mallinson, Vandana P. Janeja:

Learning to Listen and Listening to Learn: Spoofed Audio Detection Through Linguistic Data Augmentation. 1-6 - Linzi Wang, Haoda Qian, Qiudan Li, David Jingjun Xu

, Daniel Dajun Zeng:
Style-Driven Multi-Perspective Relevance Mining Model for Hotspot Reprint Paragraph Prediction. 1-6 - Adhishree Kathikar, Aishwarya Nair, Ben Lazarine, Agrim Sachdeva, Sagar Samtani

:
Assessing the Vulnerabilities of the Open-Source Artificial Intelligence (AI) Landscape: A Large-Scale Analysis of the Hugging Face Platform. 1-6 - Benjamin Ampel

, Tala Vahedi
, Sagar Samtani
, Hsinchun Chen:
Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Framework: A Multi-label Transformer Approach. 1-6 - Avishek Bose, Huichen Yang, Marissa Shivers, Ahat Orazgeldiyev, William H. Hsu:

Context-Augmented Key Phrase Extraction from Short Texts for Cyber Threat Intelligence Tasks. 1-6 - Justin M. Nelson, Timothy L. Heggedahl, Mary E. Frame, Anna M. Maresca, Bradley R. Schlessman:

Building the Future of Intelligence, Surveillance, and Reconnaissance (ISR) Collections: The Development and Evaluation of a Collaborative ISR Tool to Support Intel Analysts. 1-6 - Ruike Zhang, Nan Xu, Wenji Mao, Daniel Zeng:

Adversarial Topic-Aware Memory Network for Cross-Lingual Stance Detection. 1-6 - Benjamin Ampel

, Kaeli Otto, Sagar Samtani
, Hsinchun Chen:
Disrupting Ransomware Actors on the Bitcoin Blockchain: A Graph Embedding Approach. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














