Login / Signup

Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence.

John GrishamSagar SamtaniMark W. PattonHsinchun Chen
Published in: ISI (2017)
Keyphrases
  • cyber crime
  • countermeasures
  • context aware
  • mobile phone
  • content analysis
  • artificial intelligence
  • mobile devices
  • situation awareness
  • online communication
  • situation aware
  • email
  • identity theft
  • sir model