The Experts below are selected from a list of 7182 Experts worldwide ranked by ideXlab platform
Daniel Zeng - One of the best experts on this subject based on the ideXlab platform.
-
message from 2013 international symposium on foundations of Open Source Intelligence and security informatics chairs
Advances in Social Networks Analysis and Mining, 2013Co-Authors: Zeki Erdem, Triant G Flouris, Uwe Glasser, David B Skillicorn, Daniel ZengAbstract:The International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI 2013, Niagara Falls, ON, Canada, 26–27 August 2013) provides a unique international forum for academic researchers, government professionals and industrial practitioners to socialize, share their ideas, and exchange their data, knowledge, and expertise. Terrorism and crime threaten the international community and our society more than ever before. Criminal networks and terrorist groups that often operate globally try to hide their illegal activities by using advanced information and communications technology. They communicate easier and form global communities that are hard to track. Fortunately, reSources like social media, event logs, phone call logs, web logs, and other time series data, constitute a rich Source for knowledge discovery. There is a serious need for innovative techniques and tools capable of achieving the ultimate goal of early warning to help detecting, identifying and neutralizing the Source of a threat. Motivated by this need with high social impact, research related to Open Source Intelligence and security informatics is gaining momentum in academia, industry, law enforcement and Intelligence agencies. Developing effective knowledge discovery methods, techniques and tools to combat crime and terrorism requires coordinated and intensified collaborations across these communities. After the careful review of submitted papers by 90 expert reviewers, about 20 papers were finally accepted.
-
story extraction from the web a case study in security informatics
International Conference on Service Operations and Logistics and Informatics, 2010Co-Authors: Wenji Mao, Daniel ZengAbstract:Open Source Intelligence is becoming more and more important in security-related applications. Effective extraction of valuable information from these Intelligence Sources so as to understand the content of Intelligence is one of the central issues in security domain. To address this key problem, this paper studies how to extract domain events and generate story representation of the events. We implement a story extraction platform (SEP) which applies pattern matching to extract events from Web news and organizes events based on theme using narrative structure. We also design extraction rules, use domain-specific features and employ ontology to facilitate story extraction in SEP. The experimental results show the effectiveness of our system in security informatics.
Jong Hyuk Park - One of the best experts on this subject based on the ideXlab platform.
-
blockchain based cyber threat Intelligence system architecture for sustainable computing
Sustainability, 2020Co-Authors: Jeonghun Cha, Sushil Kumar Singh, Yi Pan, Jong Hyuk ParkAbstract:Nowadays, the designing of cyber-physical systems has a significant role and plays a substantial part in developing a sustainable computing ecosystem for secure and scalable network architecture. The introduction of Cyber Threat Intelligence (CTI) has emerged as a new security system to mitigate existing cyber terrorism for advanced applications. CTI demands a lot of requirements at every step. In particular, data collection is a critical Source of information for analysis and sharing; it is highly dependent on the reliability of the data. Although many feeds provide information on threats recently, it is essential to collect reliable data, as the data may be of unknown origin and provide information on unverified threats. Additionally, effective reSource management needs to be put in place due to the large volume and diversity of the data. In this paper, we propose a blockchain-based cyber threat Intelligence system architecture for sustainable computing in order to address issues such as reliability, privacy, scalability, and sustainability. The proposed system model can cooperate with multiple feeds that collect CTI data, create a reliable dataset, reduce network load, and measure organizations’ contributions to motivate participation. To assess the proposed model’s effectiveness, we perform the experimental analysis, taking into account various measures, including reliability, privacy, scalability, and sustainability. Experimental results of evaluation using the IP of 10 Open Source Intelligence (OSINT) CTI feeds show that the proposed model saves about 15% of storage space compared to total network reSources in a limited test environment.
Babak Akhgar - One of the best experts on this subject based on the ideXlab platform.
-
an investigation of using classification techniques in prediction of type of targets in cyber attacks
International Conference on Global Security Safety and Sustainability, 2019Co-Authors: Sina Pournouri, Shahrzad Zargari, Babak AkhgarAbstract:Prediction of type of targets in cyber-attacks can be very important in designing an extensive framework to tackle future cyber incidents. Different sectors based on the nature of their business can be a specific target for some types of cyber-attack. Different businesses need to learn from past mistakes and identify the potential risks and vulnerabilities in order to be prepared against future cyber breaches. This study aims to investigate prediction of type of targets based on classification techniques and Open Source Intelligence.
-
surveillance and falsification implications for Open Source Intelligence investigations
Communications of The ACM, 2015Co-Authors: Petra Saskia Bayerl, Babak AkhgarAbstract:Legitimacy of surveillance is crucial to safeguarding validity of OSINT data as a tool for law-enforcement agencies.
Jeonghun Cha - One of the best experts on this subject based on the ideXlab platform.
-
blockchain based cyber threat Intelligence system architecture for sustainable computing
Sustainability, 2020Co-Authors: Jeonghun Cha, Sushil Kumar Singh, Yi Pan, Jong Hyuk ParkAbstract:Nowadays, the designing of cyber-physical systems has a significant role and plays a substantial part in developing a sustainable computing ecosystem for secure and scalable network architecture. The introduction of Cyber Threat Intelligence (CTI) has emerged as a new security system to mitigate existing cyber terrorism for advanced applications. CTI demands a lot of requirements at every step. In particular, data collection is a critical Source of information for analysis and sharing; it is highly dependent on the reliability of the data. Although many feeds provide information on threats recently, it is essential to collect reliable data, as the data may be of unknown origin and provide information on unverified threats. Additionally, effective reSource management needs to be put in place due to the large volume and diversity of the data. In this paper, we propose a blockchain-based cyber threat Intelligence system architecture for sustainable computing in order to address issues such as reliability, privacy, scalability, and sustainability. The proposed system model can cooperate with multiple feeds that collect CTI data, create a reliable dataset, reduce network load, and measure organizations’ contributions to motivate participation. To assess the proposed model’s effectiveness, we perform the experimental analysis, taking into account various measures, including reliability, privacy, scalability, and sustainability. Experimental results of evaluation using the IP of 10 Open Source Intelligence (OSINT) CTI feeds show that the proposed model saves about 15% of storage space compared to total network reSources in a limited test environment.
Sushil Kumar Singh - One of the best experts on this subject based on the ideXlab platform.
-
blockchain based cyber threat Intelligence system architecture for sustainable computing
Sustainability, 2020Co-Authors: Jeonghun Cha, Sushil Kumar Singh, Yi Pan, Jong Hyuk ParkAbstract:Nowadays, the designing of cyber-physical systems has a significant role and plays a substantial part in developing a sustainable computing ecosystem for secure and scalable network architecture. The introduction of Cyber Threat Intelligence (CTI) has emerged as a new security system to mitigate existing cyber terrorism for advanced applications. CTI demands a lot of requirements at every step. In particular, data collection is a critical Source of information for analysis and sharing; it is highly dependent on the reliability of the data. Although many feeds provide information on threats recently, it is essential to collect reliable data, as the data may be of unknown origin and provide information on unverified threats. Additionally, effective reSource management needs to be put in place due to the large volume and diversity of the data. In this paper, we propose a blockchain-based cyber threat Intelligence system architecture for sustainable computing in order to address issues such as reliability, privacy, scalability, and sustainability. The proposed system model can cooperate with multiple feeds that collect CTI data, create a reliable dataset, reduce network load, and measure organizations’ contributions to motivate participation. To assess the proposed model’s effectiveness, we perform the experimental analysis, taking into account various measures, including reliability, privacy, scalability, and sustainability. Experimental results of evaluation using the IP of 10 Open Source Intelligence (OSINT) CTI feeds show that the proposed model saves about 15% of storage space compared to total network reSources in a limited test environment.