Cybercrime detection in online communications: The experimental case of cyberbullying detection in the twitter network, Computers in Human Behavior, vol.63, pp.433-443, 2016. ,
Windows of vulnerability: A case study analysis, Computer, vol.33, issue.12, pp.52-59, 2000. ,
Detecting spammers on twitter, Collaboration, electronic messaging, anti-abuse and spam conference, vol.6, p.0, 2010. ,
Before we knew it: an empirical study of zero-day attacks in the real world, Proceedings of the 2012 ACM conference on Computer and communications security, pp.833-844, 2012. ,
Twitter mood as a stock market predictor, Computer, vol.44, issue.10, pp.91-94, 2011. ,
Off-path tcp exploits: Global rate limit considered dangerous, 25th USENIX Security Symposium (USENIX Security 16), pp.210-225, 2016. ,
Statistical features-based real-time detection of drifted twitter spam, IEEE Transactions on Information Forensics and Security, vol.12, issue.4, pp.914-925, 2017. ,
, Spammers are becoming "smarter" on twitter. IT Professional, vol.18, pp.66-70, 2016.
,
#earthquake: Twitter as a distributed sensor system, Transactions in GIS, vol.17, issue.1, pp.124-147, 2012. ,
, Who shall we follow in twitter for cyber vulnerability? In: Social Computing, Behavioral-Cultural Modeling and Prediction, pp.394-402, 2013.
Botornot: A system to evaluate social bots, Proceedings of the 25th International Conference Companion on World Wide Web, pp.273-274, 2016. ,
A new cyber security alert system for twitter, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA), 2015. ,
Large-scale vulnerability analysis, Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, 2006. ,
0-day patch-exposing vendors(in) security performance, BlackHat Europe, 2008. ,
@ spam: the underground on 140 characters or less, Proceedings of the 17th ACM conference on Computer and communications security, pp.27-37, 2010. ,
A survey of emerging threats in cybersecurity, Journal of Computer and System Sciences, vol.80, issue.5, pp.973-993, 2014. ,
Security information sharing via twitter:'heartbleed'as a case study, International Journal of Web Based Communities, vol.13, issue.2, pp.172-192, 2017. ,
Crowdsourcing cybersecurity, Proceedings of the 2017 ACM on Conference on Information and Knowledge Management-CIKM 17, 2017. ,
,
WarningBird: A near real-time detection system for suspicious URLs in twitter stream, IEEE Transactions on Dependable and Secure Computing, vol.10, issue.3, pp.183-195, 2013. ,
DOI : 10.1109/tdsc.2013.3
Use of the common vulnerabilities and exposures (CVE) vulnerability naming scheme, 2002. ,
Creating a patch and vulnerability management program, 2005. ,
DOI : 10.6028/nist.sp.800-40ver2
URL : https://doi.org/10.6028/nist.sp.800-40ver2
A brief study of wannacry threat: Ransomware attack 2017, International Journal, vol.8, issue.5, 2017. ,
Detecting streaming of twitter spam using hybrid method. Wireless Personal Communications, 2018. ,
,
Weakly supervised extraction of computer security events from twitter, Proceedings of the 24th International Conference on World Wide Web-WWW 15, 2015. ,
DOI : 10.1145/2736277.2741083
URL : http://www.www2015.it/documents/proceedings/proceedings/p896.pdf
,
Vulnerability disclosure in the age of social media: exploiting twitter for predicting real-world exploits, 24th USENIX Security Symposium (USENIX Security 15), pp.1041-1056, 2015. ,
Shadow cyber threat intelligence and its use in information security and risk management processes, Multikonferenz Wirtschaftsinformatik (MKWI 2018, 2018. ,
Threat intelligence sharing platforms: An exploratory study of software vendors and research perspectives, Proceedings of the International Conference on Wirtschaftsinformatik 2017, 2017. ,
SONAR, Proceedings of the 12th International Conference on Availability, Reliability and Security, 2017. ,
Detecting spammers on twitter based on content and social interaction, 2015 International Conference on Network and Information Systems for Computers, 2015. ,
DOI : 10.1109/icnisc.2015.82
Information security management needs more holistic approach: A literature review, International Journal of Information Management, vol.36, issue.2, pp.215-225, 2016. ,
DOI : 10.1016/j.ijinfomgt.2015.11.009
,
Predicting flu epidemics using twitter and historical data, Brain Informatics and Health, pp.164-177, 2014. ,
DOI : 10.1007/978-3-319-09891-3_16
On the influence of social bots in online protests, Lecture Notes in Computer Science, pp.269-278, 2016. ,
Analyzing software vendors patch release behavior in the age of social media, Proceedings of the International Conference on Information Systems, 2017. ,
What it takes to get retweeted: An analysis of software vulnerability messages, Computers in Human Behavior, vol.80, pp.207-215, 2018. ,
DOI : 10.1016/j.chb.2017.11.024
Mining social networks for software vulnerabilities monitoring, 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), 2015. ,
DOI : 10.1109/ntms.2015.7266506
Don't follow me: Spam detection in twitter, Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on, pp.1-10, 2010. ,