2017 IEEE International Conference on Big Data (Big Data) 2017
DOI: 10.1109/bigdata.2017.8258509
|View full text |Cite
|
Sign up to set email alerts
|

Improving cyber-attack predictions through information foraging

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Sentiment analysis of social networks was also a data source for Shu et al [17] in 2018. Information foraging for improving cyber attack predictions was also discussed by Dalton et al [105] in 2017. The authors, however, discuss various strategies for information foraging and only briefly mention the data sources with which they work.…”
Section: Other Approachesmentioning
confidence: 99%
“…Sentiment analysis of social networks was also a data source for Shu et al [17] in 2018. Information foraging for improving cyber attack predictions was also discussed by Dalton et al [105] in 2017. The authors, however, discuss various strategies for information foraging and only briefly mention the data sources with which they work.…”
Section: Other Approachesmentioning
confidence: 99%
“…These findings can be used to improve the profile of certain cyber criminals and better predict cyber incidents initiated by these particular cyber threat actors. 30 Dalton et al (2017) propose to improve cyber incident forecasting through cognitive augmentation and information foraging using publicly available data sources, such as the data available on the website Hackmageddon, that have not been typically used for cyber incident prediction. 31 27 Palash Goyal, Tozammel Hossain, Ashok Deb, Nazgol Tavabi, Nathan Barley, Andrés Abeliuk, Emilio Ferrara, and Kristina Lerman, "Discovering Signals from Web Sources to Predict Cyber Attacks," arXiv, preprint, August 2018.…”
Section: Novel Data Collection Domains and Methodological Trends That...mentioning
confidence: 99%
“…For example, back up matches the class template containing advance, and pivot matches the class template containing rotate. We then considered the Non-Spatial Subset for generation of cyber-related notifications, a sub-task of an ongoing cyber-attack prediction project (Dalton et al, 2017). We determined that the Fill, Overlap, and Block patterns apply to members of the same classes that were relevant to robot navigation.…”
Section: Stylus: Spatial and Non-spatial Subset Of Lvd Classesmentioning
confidence: 99%