var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=usc-isi-i2.github.io/effect/doc/complete.bib&group0=year&css=1&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=usc-isi-i2.github.io/effect/doc/complete.bib&group0=year&css=1&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=usc-isi-i2.github.io/effect/doc/complete.bib&group0=year&css=1&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2018\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n DarkEmbed: Exploit Prediction with Neural Language Models.\n \n \n \n \n\n\n \n Tavabi, N.; Goyal, P.; Almukaynizi, M.; Shakarian, P.; and Lerman, K.\n\n\n \n\n\n\n In Thirty-Second AAAI Conference on Artificial Intelligence, 2018. \n \n\n\n\n
\n\n\n\n \n \n \"DarkEmbed:Link\n  \n \n \n \"DarkEmbed:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 16 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{tavabi:aaai,\n\tauthor = "Nazgol Tavabi and Palash Goyal and Mohammed Almukaynizi and Paulo Shakarian and Kristina Lerman",\n\ttitle = "DarkEmbed: Exploit Prediction with Neural Language Models",\n\tbooktitle = {Thirty-Second AAAI Conference on Artificial Intelligence},\n\tYear = {2018},\n\turlLink = {https://www.aaai.org/ocs/index.php/AAAI/AAAI18/paper/view/17304},\n\turlPaper = {http://usc-isi-i2.github.io/papers/tavabi18-aaai.pdf}\n\t}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Community Finding of Malware and Exploit Vendors on Darkweb Marketplaces.\n \n \n \n \n\n\n \n Marin, E.; Almukaynizi, M.; Nunes, E.; and Shakarian, P.\n\n\n \n\n\n\n In 2018 1st International Conference on Data Intelligence and Security (ICDIS), 2018. \n \n\n\n\n
\n\n\n\n \n \n \"CommunityLink\n  \n \n \n \"CommunityPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{marin:icdis,\n\tauthor = "Ericsson Marin and Mohammed Almukaynizi and Eric Nunes and Paulo Shakarian",\n\ttitle = "Community Finding of Malware and Exploit Vendors on Darkweb Marketplaces",\n\tbooktitle = {2018 1st International Conference on Data Intelligence and Security (ICDIS)},\n\tYear = {2018},\n\turlLink = {https://ieeexplore.ieee.org/document/8367743},\n\turlPaper = {http://usc-isi-i2.github.io/papers/marin18-icdis.pdf}\n\t}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n DISCOVER: Mining Online Chatter for Emerging Cyber Threats.\n \n \n \n \n\n\n \n Sapienza, A.; Ernala, S. K.; Bessi, A.; Lerman, K.; and Ferrara, E.\n\n\n \n\n\n\n In The Third Workshop on Computational Methods in CyberSafety, Online Harassment and Misinformation, 2018. \n \n\n\n\n
\n\n\n\n \n \n \"DISCOVER:Link\n  \n \n \n \"DISCOVER:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{sapienza:www,\n\tauthor = "Anna Sapienza and Sindhu Kiranmai Ernala and Alessandro Bessi and Kristina Lerman and Emilio Ferrara",\n\ttitle = "DISCOVER: Mining Online Chatter for Emerging Cyber Threats",\n\tbooktitle = {The Third Workshop on Computational Methods in CyberSafety, Online Harassment and Misinformation},\n\tYear = {2018},\n\turlLink = {https://dl.acm.org/citation.cfm?id=3191528},\n\turlPaper = {http://usc-isi-i2.github.io/papers/sapienza18-www.pdf}\n\t}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Mining Key-Hackers on Darkweb Forums.\n \n \n \n \n\n\n \n Marin, E.; Shakarian, J.; and Shakarian, P.\n\n\n \n\n\n\n In 2018 1st International Conference on Data Intelligence and Security (ICDIS), 2018. \n \n\n\n\n
\n\n\n\n \n \n \"MiningLink\n  \n \n \n \"MiningPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 8 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{marin:icdis1,\n\tauthor = "Ericsson Marin and Jana Shakarian and Paulo Shakarian",\n\ttitle = "Mining Key-Hackers on Darkweb Forums",\n\tbooktitle = {2018 1st International Conference on Data Intelligence and Security (ICDIS)},\n\tYear = {2018},\n\turlLink = {https://ieeexplore.ieee.org/document/8367642},\n\turlPaper = {http://usc-isi-i2.github.io/papers/marin18-icdis1.pdf}\n\t}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Graph embedding techniques, applications, and performance: A survey.\n \n \n \n \n\n\n \n Goyal, P.; and Ferrara, E.\n\n\n \n\n\n\n In Knowledge-Based Systems, Volume 151, 1 July 2018, Pages 78-94, 2018. \n \n\n\n\n
\n\n\n\n \n \n \"GraphLink\n  \n \n \n \"GraphPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{goyal:knosys,\n\tauthor = "Palash Goyal and Emilio Ferrara",\n\ttitle = "Graph embedding techniques, applications, and performance: A survey",\n\tbooktitle = {Knowledge-Based Systems, Volume 151, 1 July 2018, Pages 78-94},\n\tYear = {2018},\n\turlLink = {https://doi.org/10.1016/j.knosys.2018.03.022},\n\turlPaper = {http://usc-isi-i2.github.io/papers/goyal18-knosys.pdf}\n\t}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Crisis and Collective Problem Solving in Dark Web: An Exploration of a Black Hat Forum.\n \n \n \n \n\n\n \n Kwon, K. H.; Priniski, J. H.; Sarkar, S.; Shakarian, J.; and Shakarian, P.\n\n\n \n\n\n\n In 9th International Conference on Social Media & Society, 2017. \n \n\n\n\n
\n\n\n\n \n \n \"CrisisLink\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{kwon:icps,\n\tauthor = "\tK. Hazel Kwon\tand J. Hunter Priniski\tand Soumajyoti Sarkar and Jana Shakarian and Paulo Shakarian",\n\ttitle = "Crisis and Collective Problem Solving in Dark Web: An Exploration of a Black Hat Forum",\n\tbooktitle = {9th International Conference on Social Media & Society},\n\tYear = {2017},\n\turlLink={https://dl.acm.org/citation.cfm?id=3097331&dl=ACM}\n\t}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Predicting Cyber Threats through Hacker Social Networks in Darkweb and Deepweb Forums.\n \n \n \n \n\n\n \n Almukaynizi, M.; Grimm, A.; Nunes, E.; Shakarian, J.; and Shakarian, P.\n\n\n \n\n\n\n In Proceedings of the 2017 International Conference of The Computational Social Science Society of the Americas, 2017. \n \n\n\n\n
\n\n\n\n \n \n \"PredictingLink\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{almukaynizi:css,\n\tauthor = "Mohammed Almukaynizi and Alexander Grimm and Eric Nunes and Jana Shakarian and Paulo Shakarian",\n\ttitle = "Predicting Cyber Threats through Hacker Social Networks in Darkweb and Deepweb Forums",\n\tbooktitle = {Proceedings of the 2017 International Conference of The Computational Social Science Society of the Americas},\n\tYear = {2017},\n\turlLink = {https://dl.acm.org/citation.cfm?doid=3145574.3145590}\n\t}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Proactive Identification of Exploits in the Wild through Vulnerability Mentions Online.\n \n \n \n \n\n\n \n Almukaynizi, M.; Nunes, E.; Dhariya, K.; Senguttuvan, M.; Shakarian, J.; and Shakarian, P.\n\n\n \n\n\n\n In 2017 International Conference on Cyber Conflict (CyCon U.S.), 2017. \n \n\n\n\n
\n\n\n\n \n \n \"ProactiveLink\n  \n \n \n \"ProactivePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{almukaynizi:cycon,\n\tauthor = "Mohammed Almukaynizi and Eric Nunes and Krishna Dhariya and Manoj Senguttuvan and Jana Shakarian and Paulo Shakarian",\n\ttitle = "Proactive Identification of Exploits in the Wild through Vulnerability Mentions Online",\n\tbooktitle = {2017 International Conference on Cyber Conflict (CyCon U.S.)},\n\tYear = {2017},\n\turlLink = {https://ieeexplore.ieee.org/document/8167501},\n\turlPaper = {http://usc-isi-i2.github.io/papers/almukaynizi17-cycon.pdf}\n\t}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Early Warnings of Cyber Threats in Online Discussions.\n \n \n \n \n\n\n \n Sapienza, A.; Bessi, A.; Damodaran, S.; Shakarian, P.; Lerman, K.; and Ferrara, E.\n\n\n \n\n\n\n In 2017 IEEE International Conference on Data Mining Workshops (ICDMW), 2017. \n \n\n\n\n
\n\n\n\n \n \n \"EarlyLink\n  \n \n \n \"EarlyPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{sapienza:icdmw,\n\tauthor = "Anna Sapienza and Alessandro Bessi and Saranya Damodaran and Paulo Shakarian and Kristina Lerman and Emilio Ferrara",\n\ttitle = "Early Warnings of Cyber Threats in Online Discussions",\n\tbooktitle = {2017 IEEE International Conference on Data Mining Workshops (ICDMW)},\n\tYear = {2017},\n\turlLink = {https://ieeexplore.ieee.org/document/8215726},\n\turlPaper = {http://usc-isi-i2.github.io/papers/sapienza17-icdmw.pdf}\n\t}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Early Warning Generation for Cyber Threats from Online Discussions.\n \n \n \n \n\n\n \n Bessi, A.; Sapienza, A.; Lerman, K.; Shakarian, P.; and Ferrara, E.\n\n\n \n\n\n\n In DMCS - Data Mining for Cyber Security 2017, 2017. \n \n\n\n\n
\n\n\n\n \n \n \"EarlyPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{kris:dmcs,\n\tauthor = "Alessandro Bessi and Anna Sapienza and  Kristina Lerman and Paulo Shakarian and Emilio Ferrara",\n\ttitle = "Early Warning Generation for Cyber Threats from Online Discussions",\n\tbooktitle = {DMCS - Data Mining for Cyber Security 2017},\n\tYear = {2017},\n\turlPaper= {http://usc-isi-i2.github.io/papers/kristina01.pdf},\n\t}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Predicting Cyber Threats through the Dynamics of User Connectivity in Darkweb and Deepweb Forums.\n \n \n \n \n\n\n \n Almukaynizi, M.; Grimm, A.; Nunes, E.; Shakarian, J.; and Shakarian, P.\n\n\n \n\n\n\n In ACM Computational Social Science (CSS-2017), 2017. \n \n\n\n\n
\n\n\n\n \n \n \"PredictingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{kris:acm,\n\tauthor = "Mohammed Almukaynizi and Alexander Grimm and Eric Nunes and Jana Shakarian and Paulo Shakarian",\n\ttitle = "Predicting Cyber Threats through the Dynamics of User Connectivity in Darkweb and Deepweb Forums",\n\tbooktitle =  {ACM Computational Social Science (CSS-2017)},\n\tYear = {2017},\n\turlPaper= {http://usc-isi-i2.github.io/papers/kristina02.pdf},\n\t}
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);