CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities

ASONAM '16: Advances in Social Networks Analysis and Mining 2016 Davis California August, 2016, pp. 860-867, 2016.

Cited by: 19|Bibtex|Views18|DOI:https://doi.org/10.5555/3192424.3192585
EI
Other Links: dblp.uni-trier.de|academic.microsoft.com|dl.acm.org

Abstract:

In order to secure vital personal and organizational system we require timely intelligence on cybersecurity threats and vulnerabilities. Intelligence about these threats is generally available in both overt and covert sources like the National Vulnerability Database, CERT alerts, blog posts, social media, and dark web resources. Intellige...More

Code:

Data:

Your rating :
0

 

Tags
Comments