Items where Subject is "46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460499 Cybersecurity and privacy not elsewhere classified"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: B | C | D | L | R | T | X
Number of items at this level: 12.

B

Ban, Xinbo, Chen, Chao, Liu, Shigang, Wang, Yu, and Zhang, Jun (2019) Deep-learnt features for Twitter spam detection. In: Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data. pp. 208-212. From: SocialSec 2018: International Symposium on Security and Privacy in Social Networks and Big Data, 10-11 December 2018, Santa Clara, CA, USA.

C

Chen, Chao, Wen, Sheng, Zhang, Jun, Xiang, Yang, Oliver, Jonathan, Alelaiwi, Abdulhameed, and Hassan, Mohammad Mehedi (2017) Investigating the deceptive information in twitter spam. Future Generation Computer Systems, 72. pp. 319-326.

Chen, Chao, Wang, Yu, Zhang, Jun, Xiang, Yang, Zhou, Wanlei, and Min, Geyong (2017) Statistical features-based real-tme detection of drifted Twitter spam. IEEE Transactions on Information Forensics and Security, 12 (4). pp. 914-925.

Chen, Chao, Zhang, Jun, Xiang, Yang, Zhou, Wanlei, and Oliver, Jonathan (2016) Spammers are becoming "smarter" on Twitter. IT Professional, 18 (2). pp. 66-70.

D

Dillon, Roberto, Lothian, Paul, Grewal, Simran, and Pereira, Daryl (2021) Cyber security: evolving threats in an ever-changing world. In: Kuah, Adrian T.H., and Dillon, Roberto, (eds.) Digital Transformation in a Post-COVID World: sustainable innovation, disruption, and change. CRC Press, Boca Raton, FL, USA, pp. 131-155.

Dillon, Roberto, and Vagal, Vihangi (2021) Reducing cyber risk in remote working. In: Kuah, Adrian T.H., and Dillon, Roberto, (eds.) Digital Transformation in a Post-COVID World: sustainable innovation, disruption, and change. CRC Press, Boca Raton, FL, USA, pp. 157-171.

L

Liu, Liu, De Vel, Olivier, Chen, Chao, Zhang, Jun, and Xiang, Yang (2018) Anomaly-based insider threat detection using deep autoencoders. In: Proceedings of the IEEE International Conference on Data Mining Workshops. pp. 39-48. From: ICDMW 2018: IEEE International Conference on Data Mining Workshops, 17-20 November 2018, Singapore.

Liu, Shigang, Wang, Yu, Zhang, Jun, Chen, Chao, and Xiang, Yang (2017) Addressing the class imbalance problem in twitter spam detection using ensemble learning. Computers & Security, 69. pp. 35-49.

Liu, Shigang, Wang, Yu, Chen, Chao, and Xiang, Yang (2016) An ensemble learning approach for addressing the class imbalance problem in twitter spam detection. In: Lecture Notes in Computer Science (9722) pp. 215-228. From: ACISP 2016: 21st Australasian Conference on Information Security and Privacy, 4-6 July 2016, Melbourne, VIC, Australia.

R

Rajesh, Harsha Mittemari, and Song, Insu (2016) E-commerce websites/blogs - hassles and predicaments. In: Proceedings of the 6th International Conference on Communication and Network Security. pp. 56-61. From: ICCNS 2016: 6th International Conference on Communication and Network Security, 26-29 November 2016, Singapore.

T

Torten, Ron, Reaiche, Carmen, and Boyle, Stephen (2018) The impact of security awareness on information technology professionals' behavior. Computers & Security, 79. pp. 68-79.

X

Xie, Bailin, Wang, Yu, Chen, Chao, and Xiang, Yang (2016) Gatekeeping behavior analysis for information credibility assessment on Weibo. In: Lecture Notes in Computer Science (9955) pp. 483-496. From: NSS 2016: 10th International Conference on Network and System Security, 28-30 September 2016, Taipei, Taiwan.

This list was generated on Wed Oct 20 22:51:01 2021 AEST.