2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA) 2015
DOI: 10.1109/icmla.2015.133
|View full text |Cite
|
Sign up to set email alerts
|

A New Cyber Security Alert System for Twitter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 7 publications
0
11
0
Order By: Relevance
“…Many false information-detection techniques [109], [113], [116] have expanded the tf-idf feature together with other linguistic cues such as phrases, grammar, negatives, and punctuation. SVMs can detect satirical sentiment in sentences that are potentially misleading news [113], whereas with Naïve Bayes, it is possible to classify topics on Twitter to detect spam or phishing [117]. DNNs have shown their ability to detect hate speech in tweets with 93 percent accuracy [116].…”
Section: Application Layermentioning
confidence: 99%
See 1 more Smart Citation
“…Many false information-detection techniques [109], [113], [116] have expanded the tf-idf feature together with other linguistic cues such as phrases, grammar, negatives, and punctuation. SVMs can detect satirical sentiment in sentences that are potentially misleading news [113], whereas with Naïve Bayes, it is possible to classify topics on Twitter to detect spam or phishing [117]. DNNs have shown their ability to detect hate speech in tweets with 93 percent accuracy [116].…”
Section: Application Layermentioning
confidence: 99%
“…Despite recent advances in text classification tasks, detecting cyberattacks at the semantic level is still in its infancy. Studies that employed tf-idf [109], [113]- [115], [117] required human intervention to supply relevant words such as ''dead'' or ''bomb'' to detect threats [109], and ''age,'' ''yr,'' or ''year'' to detect predators [115]. This shows that, despite the use of AI, cyberthreat detection at the current application layer still requires human intelligence intervention.…”
Section: Application Layermentioning
confidence: 99%
“…To this end, we plotted such relationship (see Fig. 7) where x-axis represents affiliation values and y-axis shows the influence metric normalized in the range [0,1]. Results confirm that users with a high degree of affiliation have very low influence, and higher values of influence metric are obtained when the affiliation assumes values lower than 0,1.…”
Section: Methodsmentioning
confidence: 76%
“…As a consequence, it is more and more necessary to introduce new techniques to prevent, detect and limit the cyber-attacks. In addition to traditional malware detection systems, new tools to boost and speed up the whole process have been proposed [1].…”
Section: Introductionmentioning
confidence: 99%
“…We have been using various contextual scenarios in which live and socially generated data play an important role in creating alerts in humanitarian catastrophes, addressing incidents which affect populations, and recognizing natural and health hazards [10,14,15,17,28]. There is significant evidence that Twitter data is one of the best available OSINT sources [6,9,21,22]. The Twitter platform plays as important a role in detecting cyber security threats as it may have in addressing humanitarian crises and resilience [16,28].…”
Section: Introductionmentioning
confidence: 99%