Login / Signup
Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence.
John Grisham
Sagar Samtani
Mark W. Patton
Hsinchun Chen
Published in:
ISI (2017)
Keyphrases
</>
cyber crime
countermeasures
context aware
mobile phone
content analysis
artificial intelligence
mobile devices
situation awareness
online communication
situation aware
email
identity theft
sir model