Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?
Dincy R. ArikkatP. VinodRafidha Rehiman K. A.Andrea Di SorboCorrado Aaron VisaggioMauro ContiPublished in: CoRR (2023)
Keyphrases
- cyber attacks
- intrusion detection system
- intrusion detection
- cyber security
- countermeasures
- attack detection
- social media
- network security
- social networks
- security policies
- computer networks
- online social networks
- critical infrastructure
- social networking
- anomaly detection
- dos attacks
- network traffic
- cost effective
- computer systems
- personal information