CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities.
Sudip MittalPrajit Kumar DasVarish MulwadAnupam JoshiTim FininPublished in: ASONAM (2016)
Keyphrases
- attack scenarios
- countermeasures
- information security
- security vulnerabilities
- security issues
- intrusion detection
- social media
- security risks
- intrusion detection system
- social networks
- security breaches
- alert correlation
- automatically generate
- attack detection
- attack graph
- social networking sites
- buffer overflow
- attack graphs
- data mining