- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources3
- Resource Type
-
10020
- Availability
-
30
- Author / Contributor
- Filter by Author / Creator
-
-
Samtani, Sagar (3)
-
Chen, Hsinchun (2)
-
Arnold, Nolan (1)
-
Bou-Harb, Elias (1)
-
Crichigno, Jorge (1)
-
Ebrahimi, Mohammadreza (1)
-
Friday, Kurt (1)
-
Ghani, Nasir (1)
-
Iqbal, Farkhund (1)
-
Lazarine, Ben (1)
-
Mangino, Antonio (1)
-
Nunamaker, Jay F. (1)
-
Patton, Mark (1)
-
Rathbun, Matthias (1)
-
Safaei Pour, Morteza (1)
-
Zhang, Ning (1)
-
Zhu, Hongyi (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
- (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Safaei Pour, Morteza ; Mangino, Antonio ; Friday, Kurt ; Rathbun, Matthias ; Bou-Harb, Elias ; Iqbal, Farkhund ; Samtani, Sagar ; Crichigno, Jorge ; Ghani, Nasir ( , Computers & Security)
-
Arnold, Nolan ; Ebrahimi, Mohammadreza ; Zhang, Ning ; Lazarine, Ben ; Patton, Mark ; Chen, Hsinchun ; Samtani, Sagar ( , 2019 IEEE Conference on Intelligence and Security Informatics)The frequency and costs of cyber-attacks are increasing each year. By the end of 2019, the total cost of data breaches is expected to reach $2.1 trillion through the evergrowing online presence of enterprises and their consumers. The tools to perform these attacks and the breached data can often be purchased within the Dark-net. Many of the threat actors within this realm use its various platforms to broker, discuss, and strategize these cyber-threat assets. To combat these attacks, researchers are developing Cyber-Threat Intelligence (CTI) tools to proactively monitor the ever-growing online hacker community. This paper will detail the creation and use of a CTI tool that leverages a social network to identify cyber-threats across major Dark-net data sources. Through this network, emerging threats can be quickly identified so proactive or reactive security measures can be implemented.more » « less