Pathogenic Social Media (PSM) accounts such as terrorist supporter accounts and fake news writers have the capability of spreading disinformation to viral proportions.
In particular, we show that it outperforms baseline systems that attempt to generate warnings of cyber attacks related to two enterprises with an average increase in F1 score of about 45% and 57%.
Pathogenic Social Media (PSM) accounts such as terrorist supporters exploit large communities of supporters for conducting attacks on social media.
Pathogenic social media accounts such as terrorist supporters exploit communities of supporters for conducting attacks on social media.
High-order parametric models that include terms for feature interactions are applied to various data mining tasks, where ground truth depends on interactions of features.
Human trafficking is one of the most atrocious crimes and among the challenging problems facing law enforcement which demands attention of global magnitude.
Human trafficking is among the most challenging law enforcement problems which demands persistent fight against from all over the globe.
We have developed an operational system for obtaining information from these sites for the purposes of identifying emerging cyber threats.
A major challenge in cyber-threat analysis is combining information from different sources to find the person or the group responsible for the cyber-attack.
The Islamic State of Iraq and al-Sham (ISIS) is a dominant insurgent group operating in Iraq and Syria that rose to prominence when it took over Mosul in June, 2014.
Attributing a cyber-operation through the use of multiple pieces of technical evidence (i. e., malware reverse-engineering and source tracking) and conventional intelligence sources (i. e., human or signals intelligence) is a difficult problem not only due to the effort required to obtain evidence, but the ease with which an adversary can plant false evidence.
In real-world applications, knowledge bases consisting of all the information at hand for a specific domain, along with the current state of affairs, are bound to contain contradictory data coming from different sources, as well as data with varying degrees of uncertainty attached.