2019
DOI: 10.48550/arxiv.1902.10680
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…Rodriguez et al use keywords to filter for cyber-relevance and active learning to update the keywords, and use tweet sentiment as a feature over time [15]. Zong et al study the connection of severity of cyber threats with how they are discussed online [22]. Hoppa et al visualize cyber-relevant tweets in Kibana for end users [6].…”
Section: Related Workmentioning
confidence: 99%
“…Rodriguez et al use keywords to filter for cyber-relevance and active learning to update the keywords, and use tweet sentiment as a feature over time [15]. Zong et al study the connection of severity of cyber threats with how they are discussed online [22]. Hoppa et al visualize cyber-relevant tweets in Kibana for end users [6].…”
Section: Related Workmentioning
confidence: 99%
“…The progression of cybercrime and the development and adoption of new techniques to jeopardize sensitive information and impart damage across the Internet present an alarming threat to businesses, governments, and nations. Recent cybersecurity research (e.g., the works in [1][2][3][4][5][6]) confirms cybercriminals' determination to develop newer techniques for achieving their malicious objectives. Ransomware is just one of the methods that have been used recently by cybercriminals to achieve financial gains in return for releasing ransomware-encrypted files to their rightful owners.…”
Section: Introductionmentioning
confidence: 97%
“…Fan Shi [18] made use of XLNet model and self-built corpus for fine tuning to predict measures from the vulnerability description text, thus reducing the burden of the evaluation process. Zong et al [19] have studied network security threat contents on social media, trying to predict the severity of vulnerabilities based on these contents. In the study of Zou D et al [20], it is believed that the severity of vulnerability is determined according to the attack process of vulnerability.…”
Section: Introductionmentioning
confidence: 99%