CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities
ASONAM '16: Advances in Social Networks Analysis and Mining 2016 Davis California August, 2016, pp. 860-867, 2016.
EI
Abstract:
In order to secure vital personal and organizational system we require timely intelligence on cybersecurity threats and vulnerabilities. Intelligence about these threats is generally available in both overt and covert sources like the National Vulnerability Database, CERT alerts, blog posts, social media, and dark web resources. Intellige...More
Code:
Data:
Tags
Comments