• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1989 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.

Search results

  • Conference contribution

    Dark web forums portal: Searching and analyzing Jihadist forums

    Yulei, Z., Shuo, Z., Li, F., Yan, D., Larson, C. A. & Hsinchun, C., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 71-76 6 p. 5137274. (2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • Deep learning based topic identification and categorization: Mining diabetes-related topics on Chinese health websites

    Chen, X., Zhang, Y., Xu, J., Xing, C. & Chen, H., 2016, Database Systems for Advanced Applications - 21st International Conference, DASFAA 2016, Proceedings. Navathe, S. B., Wu, W., Shekhar, S., Du, X., Xiong, H. & Wang, X. S. (eds.). Springer-Verlag, p. 481-500 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9642).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Descriptive analytics: Examining expert hackers in web forums

    Abbasi, A., Li, W., Benjamin, V., Hu, S. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 56-63 8 p. 6975554. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    42 Scopus citations
  • Detecting cyber threats in non-english dark net markets: A cross-lingual transfer learning approach

    Ebrahimi, M., Surdeanu, M. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 85-90 6 p. 8587404. (2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Detecting cyber threats in non-english hacker forums: An adversarial cross-lingual knowledge transfer approach

    Ebrahimi, M., Samtani, S., Chai, Y. & Chen, H., May 2020, Proceedings - 2020 IEEE Symposium on Security and Privacy Workshops, SPW 2020. Institute of Electrical and Electronics Engineers Inc., p. 20-26 7 p. 9283883. (Proceedings - 2020 IEEE Symposium on Security and Privacy Workshops, SPW 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Developing a Dark Web collection and infrastructure for computational and social sciences

    Zhang, Y., Zeng, S., Huang, C. N., Fan, L., Yu, X., Dang, Y., Larson, C. A., Denning, D., Roberts, N. & Chen, H., Jul 26 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 59-64 6 p. 5484774. (ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • Developing understanding of hacker language through the use of lexical semantics

    Benjamin, V. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Institute of Electrical and Electronics Engineers Inc., p. 79-84 6 p. 7165943

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • Diabetes-related topic detection in Chinese health websites using deep learning

    Chen, X., Zhang, Y., Xing, C., Liu, X. & Chen, H., Jan 1 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 13-24 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Diabeticlink: An internationally collaborative cyber-enabled patient empowerment platform

    Samtani, G., Maimoon, L., Chuang, J., Nybroe, C., Liu, X., Wiil, U., Li, S. H. & Chen, H., 2016, Smart Health - International Conference, ICSH 2015, Revised Selected Papers. Chen, H., Zeng, D. D., Zheng, X. & Leischow, S. J. (eds.). Springer-Verlag, p. 299-310 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • DiabeticLink: A health big data system for patient empowerment and personalized healthcare

    Chen, H., Compton, S. & Hsiao, O., Aug 12 2013, Smart Health - International Conference, ICSH 2013, Proceedings. p. 71-83 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8040 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • DiabeticLink: An integrated and intelligent cyber-enabled health social platform for diabetic patients

    Chuang, J., Hsiao, O., Wu, P. L., Chen, J., Liu, X., De La Cruz, H., Li, S. H. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 63-74 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Digital libraries supporting digital government

    Marchionini, G., Craig, A., Brandt, L., Klavans, J. & Chen, H., Jan 1 2001, Proceedings of the 1st ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL 2001. Association for Computing Machinery, p. 395-397 3 p. (Proceedings of the ACM International Conference on Digital Libraries).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Digital libraries supporting digital government

    Marchionini, G., Craig, A., Brandt, L., Klavans, J. & Chen, H., Dec 1 2001, Proceedings of First ACM/IEEE-CS Joint Conference on Digital Libraries. p. 395-397 3 p. (Proceedings of First ACM/IEEE-CS Joint Conference on Digital Libraries).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Digital library development in the Asia Pacific

    Chen, H., Dec 1 2005, Digital Libraries: Implementing Strategies and Sharing Experiences - 8th International Conference on Asian Digital Libraries, ICADL 2005, Proceedings. p. 509-524 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3815 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Dynamic social network analysis of a dark network: Identifying significant facilitators

    Kaza, S., Hu, D. & Chen, H., Oct 1 2007, ISI 2007: 2007 IEEE Intelligence and Security Informatics. p. 40-46 7 p. 4258671. (ISI 2007: 2007 IEEE Intelligence and Security Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Dynamic user-level affect analysis in social media: Modeling violence in the dark web

    Zeng, S., Lin, M. & Chen, H., Sep 22 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 1-6 6 p. 5984041. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • EconPort: A digital library for microeconomics education

    Chen, H., Zeng, D., Kalla, R., Huang, Z., Cox, J. C. & Swarthout, J. T., 2003, Proceedings - 2003 Joint Conference on Digital Libraries, JCDL 2003. Delcambre, L., Henry, G. & Marshall, C. C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 388 1 p. 1204904. (Proceedings of the ACM/IEEE Joint Conference on Digital Libraries; vol. 2003-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Effect of inventor status on intra-organizational innovation evolution

    Kaza, S. & Chen, H., Apr 3 2009, Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. 4755398. (Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Emoticon analysis for Chinese health and fitness topics

    Yu, S., Zhu, H., Jiang, S. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Evaluating an integrated forum portal for terrorist surveillance and analysis

    Hu, P. J. H., Wan, X., Dang, Y., Larson, C. A. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 168-170 3 p. 6284288. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Evaluating text visualization: An experiment in authorship analysis

    Benjamin, V., Chung, W., Abbasi, A., Chuang, J., Larson, C. A. & Chen, H., Sep 9 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 16-20 5 p. 6578778. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Examining agencies' satisfaction with electronic record management systems in e-government: A large-scale survey study

    Hsu, F. M., Hu, P. J. H., Chen, H. & Hu, H. F., Jan 1 2009, Designing E-Business Systems: Markets, Services, and Networks - 7th Workshop on E-Business, WEB 2008, Revised Selected Papers. Springer-Verlag, p. 25-36 12 p. (Lecture Notes in Business Information Processing; vol. 22 LNBIP).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Exploiting multi-link SCTP for live TV broadcasting service

    Liu, H. S., Hsieh, C. C., Chen, H. C., Hsieh, C. H., Liao, W., Chu, P. C. & Wang, C. H., Jul 30 2010, 2010 IEEE 71st Vehicular Technology. 5493654. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Exploring extremism and terrorism on the web: The Dark Web project

    Hsinchun, C., Dec 1 2007, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings. p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Exploring hacker assets in underground forums

    Samtani, S., Chinn, R. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Institute of Electrical and Electronics Engineers Inc., p. 31-36 6 p. 7165935

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    52 Scopus citations
  • Exploring key hackers and cybersecurity threats in Chinese hacker communities

    Fang, Z., Zhao, X., Wei, Q., Chen, G., Zhang, Y., Xing, C., Li, W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 13-18 6 p. 7745436. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • Exploring the dark side of the Web: Collection and analysis of U.S. extremist online forums

    Zhou, Y., Qin, J., Lai, G., Reid, E. & Chen, H., 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer-Verlag, p. 621-626 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Exploring the online underground marketplaces through topic-based social network and clustering

    Huang, S. Y. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 145-150 6 p. 7745458. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops

    Benjamin, V., Li, W., Holt, T. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Zhou, L., Wang, G. A., Mao, W. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 85-90 6 p. 7165944. (2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    69 Scopus citations
  • Fall detection with orientation calibration using a single motion sensor

    Yu, S. & Chen, H., 2017, Wireless Mobile Communication and Healthcare - 6th International Conference, MobiHealth 2016, Proceedings. Rizzo, G., Perego, P. & Andreoni, G. (eds.). Springer-Verlag, p. 233-240 8 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 192).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • From digital library to digital government: A case study in crime data mapping and mining

    Chen, H., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2555. p. 36-52 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2555).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Gender difference analysis of political web forums: An experiment on an international Islamic women's forum

    Yulei, Z., Yan, D. & Hsinchun, C., Oct 22 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 61-64 4 p. 5137272. (2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Genescene: Biomedical text and data mining

    Leroy, G., Chen, H., Martinez, J. D., Eggers, S., Falsey, R. R., Kislin, K. L., Huang, Z., Li, J., Xu, J., McDonald, D. M. & Ng, G., 2003, Proceedings - 2003 Joint Conference on Digital Libraries, JCDL 2003. Delcambre, L., Henry, G. & Marshall, C. C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 116-118 3 p. 1204849. (Proceedings of the ACM/IEEE Joint Conference on Digital Libraries; vol. 2003-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Global disease surveillance using social media: HIV/AIDS content intervention in web forums

    Ku, Y., Chiu, C., Zhang, Y., Fan, L. & Chen, H., Jul 26 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. 1 p. 5484749. (ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Global foot-and-mouth disease surveillance using bioportal

    Thurmond, M., Perez, A., Tseng, C., Chen, H. & Zeng, D., Dec 24 2007, Intelligence and Security Informatics: Biosurveillance - Second NSF Workshop, BioSurveillance 2007, Proceedings. p. 169-179 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4506 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Graph kernel-based learning for gene function prediction from gene interaction network

    Li, X., Zhang, Z., Chen, H. & Li, J., Dec 1 2007, Proceedings - 2007 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2007. p. 368-373 6 p. 4413079. (Proceedings - 2007 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • HealthQA: A Chinese QA summary system for smart health

    Yin, Y., Zhang, Y., Liu, X., Zhang, Y., Xing, C. & Chen, H., Jan 1 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 51-62 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Health-related spammer detection on chinese social media

    Chen, X., Zhang, Y., Xu, J., Xing, C. & Chen, H., 2016, Smart Health - International Conference, ICSH 2015, Revised Selected Papers. Chen, H., Zeng, D. D., Zheng, X. & Leischow, S. J. (eds.). Springer-Verlag, p. 284-295 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Identification of extremist videos in online video sharing sites

    Tianjun, F., Huang, C. N. & Hsinchun, C., Oct 22 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 179-181 3 p. 5137295. (2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web

    Liu, Y., Lin, F. Y., Ahmad-Post, Z., Ebrahimi, M., Zhang, N., Hu, J. L., Xin, J., Li, W. & Chen, H., Nov 9 2020, Proceedings - 2020 IEEE International Conference on Intelligence and Security Informatics, ISI 2020. Institute of Electrical and Electronics Engineers Inc., 9280540. (Proceedings - 2020 IEEE International Conference on Intelligence and Security Informatics, ISI 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Identifying, collecting, and presenting hacker community data: Forums, IRC, carding shops, and DNMs

    Du, P. Y., Zhang, N., Ebrahimi, M., Samtani, S., Lazarine, B., Arnold, N., Dunn, R., Suntwal, S., Angeles, G., Schweitzer, R. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 70-75 6 p. 8587327. (2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Identifying adverse drug events from health social media: A case study on heart disease discussion forums

    Liu, X., Liu, J. & Chen, H., Jan 1 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 25-36 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • Identifying devices across the IPv4 address space

    Jicha, R., Patton, M. W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 199-201 3 p. 7745469

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Identifying high-impact opioid products and key sellers in dark net marketplaces: An interpretable text analytics approach

    Du, P. Y., Ebrahimi, M., Zhang, N., Chen, H., Brown, R. A. & Samtani, S., Jul 2019, 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019. Zheng, X., Abbasi, A., Chau, M., Wang, A. & Zhou, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 110-115 6 p. 8823196. (2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Identifying high quality carding services in underground economy using nonparametric supervised topic model

    Li, W., Yin, J. & Chen, H., 2016, 2016 International Conference on Information Systems, ICIS 2016. Association for Information Systems, (2016 International Conference on Information Systems, ICIS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Identifying language groups within multilingual cybercriminal forums

    Benjamin, V. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 205-207 3 p. 7745471

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence

    Grisham, J., Samtani, S., Patton, M. & Chen, H., Aug 8 2017, 2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017. Zhou, L., Wang, G. A., Xing, C., Luo, B., Zheng, X. & Zhang, H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 13-18 6 p. 8004867. (2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Scopus citations
  • Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques

    Samtani, S., Yu, S., Zhu, H., Patton, M. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 25-30 6 p. 7745438. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • Identifying the socio-spatial dynamics of terrorist attacks in the Middle East

    Li, Z., Sun, D., Chen, H. & Huang, S. Y., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 175-180 6 p. 7745463. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Identifying top listers in Alphabay using Latent Dirichlet Allocation

    Grisham, J., Barreras, C., Afarin, C., Patton, M. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 219 1 p. 7745477. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations