Sort by
Previous Page Page 1 of 3 Next Page
  1. Research

    Semi-supervised learning for detecting human trafficking

    Human trafficking is one of the most atrocious crimes and among the challenging problems facing law enforcement which demands attention of global magnitude. In this study, we leverage textual data from the we...

    Hamidreza Alvari, Paulo Shakarian and J. E. Kelly Snyder

    Security Informatics 2017 6:1

    Published on: 11 May 2017

  2. Case study

    Analytics for characterising and measuring the naturalness of online personae

    Currently 40 % of the world’s population, around 3 billion users, are online using cyberspace for everything from work to pleasure. While there are numerous benefits accompanying this medium, the Internet is n...

    Jason R. C. Nurse, Arnau Erola, Thomas Gibson-Robinson, Michael Goldsmith and Sadie Creese

    Security Informatics 2016 5:3

    Published on: 8 September 2016

  3. Research

    Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework

    Attackers increasingly take advantage of naive users who tend to treat non-executable files casually, as if they are benign. Such users often open non-executable files although they can conceal and perform mal...

    Nir Nissim, Aviad Cohen, Robert Moskovitch, Asaf Shabtai, Matan Edri, Oren BarAd and Yuval Elovici

    Security Informatics 2016 5:1

    Published on: 18 February 2016

  4. Research

    Improved lexicon-based sentiment analysis for social media analytics

    Social media channels, such as Facebook or Twitter, allow for people to express their views and opinions about any public topics. Public sentiment related to future events, such as demonstrations or parades, i...

    Anna Jurek, Maurice D. Mulvenna and Yaxin Bi

    Security Informatics 2015 4:9

    Published on: 9 December 2015

  5. Research

    A measurement study of DNSSEC misconfigurations

    DNSSEC offers protection against spoofing of DNS data by providing origin authentication, ensuring data integrity and authentication of non-existence by using public-key cryptography. Although the relevance of...

    Niels L. M. van Adrichem, Norbert Blenn, Antonio Reyes Lúa, Xin Wang, Muhammad Wasif, Ficky Fatturrahman and Fernando A. Kuipers

    Security Informatics 2015 4:8

    Published on: 19 October 2015

  6. Research

    Timeprints for identifying social media users with multiple aliases

    Many people who discuss sensitive or private issues on social media services are using pseudonyms or aliases in order to not reveal their true identity, while using their usual, non-private accounts when posti...

    Fredrik Johansson, Lisa Kaati and Amendra Shrestha

    Security Informatics 2015 4:7

    Published on: 24 September 2015

  7. Research

    Evasion-resistant network scan detection

    Popular network scan detection algorithms operate through evaluating external sources for unusual connection patterns and traffic rates. Research has revealed evasive tactics that enable full circumvention of ...

    Richard E Harang and Peter Mell

    Security Informatics 2015 4:4

    Published on: 9 May 2015

  8. Research

    Factors influencing network risk judgments: a conceptual inquiry and exploratory analysis

    Effectively assessing and configuring security controls to minimize network risks requires human judgment. Little is known about what factors network professionals perceive to make judgments of network risk. T...

    Jennifer Cowley, Frank L. Greitzer and Bronwyn Woods

    Security Informatics 2015 4:1

    Published on: 10 April 2015

    The Erratum to this article has been published in Security Informatics 2015 4:5

  9. Research

    Belief manipulation and message meaning for protocol analysis

    Agents often try to convince others to hold certain beliefs. In fact, many network security attacks can actually be framed in terms of a dishonest that is trying to get an honest agent to believe some particul...

    Aaron Hunter

    Security Informatics 2014 3:15

    Published on: 10 October 2014

  10. Research

    Language use in the Jihadist magazines inspire and Azan

    The language of influence or propaganda has been studied for a century but its predictions (simplification, deceptiveness, manipulation) can now be examined empirically using corpus analytics. Semantic models ...

    David B Skillicorn and Edna F Reid

    Security Informatics 2014 3:9

    Published on: 24 September 2014

  11. Research

    "Our Little Secret": pinpointing potential predators

    The word “Paedophilia” has come a long way from its Greek origin of child-companionship to a Mental Disorder, Social Taboo and Criminal Offence. Various laws are in place to help control such behaviour, protec...

    Anna Vartapetiance and Lee Gillam

    Security Informatics 2014 3:3

    Published on: 18 September 2014

  12. Research

    Evaluating text visualization for authorship analysis

    Methods and tools to conduct authorship analysis of web contents is of growing interest to researchers and practitioners in various security-focused disciplines, including cybersecurity, counter-terrorism, and...

    Victor Benjamin, Wingyan Chung, Ahmed Abbasi, Joshua Chuang, Catherine A Larson and Hsinchun Chen

    Security Informatics 2014 3:10

    Published on: 16 September 2014

  13. Research

    Using publicly visible social media to build detailed forecasts of civil unrest

    We demonstrate how one can generate predictions for several thousand incidents of Latin American civil unrest, often many days in advance, by surfacing informative public posts available on Twitter and Tumblr.

    Ryan Compton, Craig Lee, Jiejun Xu, Luis Artieda-Moncada, Tsai-Ching Lu, Lalindra De Silva and Michael Macy

    Security Informatics 2014 3:4

    Published on: 3 September 2014

  14. Research

    Acoustic environment identification using unsupervised learning

    Acoustic environment leaves its characteristic signature in the audio recording captured in it. The acoustic environment signature can be modeled using acoustic reverberations and background noise. Acoustic re...

    Hafiz Malik and Hasan Mahmood

    Security Informatics 2014 3:11

    Published on: 2 September 2014

  15. Research

    Automatic detection of cyber-recruitment by violent extremists

    Growing use of the Internet as a major means of communication has led to the formation of cyber-communities, which have become increasingly appealing to terrorist groups due to the unregulated nature of Intern...

    Jacob R Scanlon and Matthew S Gerber

    Security Informatics 2014 3:5

    Published on: 13 August 2014

Previous Page Page 1 of 3 Next Page