共 135 条
[1]
Descriptive Analytics: Examining Expert Hackers in Web Forums
[J].
2014 IEEE JOINT INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (JISIC),
2014,
:56-63
[2]
Afroz S, 2013, ECRIM RES SUM
[3]
Doppelganger Finder: Taking Stylometry To The Underground
[J].
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014),
2014,
:212-226
[4]
Akyazi U., 2021, P WORKSH EC INF SEC, P1
[5]
Economic Factors of Vulnerability Trade and Exploitation
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1483-1499
[6]
Almukaynizi Mohammed, 2017, 2017 International Conference on Cyber-Conflict (CyCon U.S.), P82, DOI 10.1109/CYCONUS.2017.8167501
[7]
Predicting Cyber Threats through Hacker Social Networks in Darkweb and Deepweb Forums
[J].
CSS 2017: THE 2017 INTERNATIONAL CONFERENCE OF THE COMPUTATIONAL SOCIAL SCIENCE SOCIETY OF THE AMERICAS,
2017,
[8]
Almukaynizi M, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P31, DOI 10.1109/ISI.2018.8587334
[9]
Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach
[J].
2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI),
2020,
:144-149
[10]
Anderson R., 2013, EC INFORM SECURITY P, P265, DOI [10.1007/978-3-642-39498-0_12, DOI 10.1007/978-3-642-39498-0_12]