IntelliTweet: A Multifaceted Feature Approach to Detect Malicious Tweets

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Symposium on Foundations and Practice of Security (16. : 2022 : Bordeaux) Foundations and practice of security ; Part 1
1. Verfasser: Dzeha, Eric Edem (VerfasserIn)
Weitere Verfasser: Jourdan, Guy-Vincent (VerfasserIn)
Pages:1
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2024
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
A Small World–Privacy Preserving IoT Device-Type Fingerprinting with Small Datasets 2024 Bar-on, Maxwel
Effectiveness of Binary-Level CFI Techniques 2024 Vaidya, Ruturaj K.
VulMAE: Graph Masked Autoencoders for Vulnerability Detection from Source and Binary Codes 2024 Zamani, Mahmoud
A BERT-Based Framework for Automated Extraction of Behavioral Indicators of Compromise from Security Incident Reports 2024 Bekhouche, Mohamed El Amine
Analysis of Cryptographic CVEs: Lessons Learned and Perspectives 2024 Khoury, Raphaël
Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code 2024 Cassagne, Julien
Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols 2024 Paillat, Ludovic
Does the Anchoring Effect Influence Individuals’ Anti-phishing Behavior Intentions? 2024 Sawaya, Yukiko
Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations 2024 Andarzian, Seyed Behnam
Automated Attacker Behaviour Classification Using Threat Intelligence Insights 2024 Crochelet, Pierre
UDP State Manipulation: Description of a Packet Filtering Vulnerability in Stateful Firewalls 2024 Koribeche, Wassim
Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure 2024 Brisfors, Martin
Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response 2024 Biswas, Sayan
Securing Smart Vehicles Through Federated Learning 2024 Halim, Sadaf M. D.
Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection 2024 Aurora, Victor
URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures 2024 Besson, Pierre-Victor
Web Scams Detection System 2024 Badawi, Emad
Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware 2024 Faghihi, Farnood
Original Entry Point Detection Based on Graph Similarity 2024 Pham, Thanh-Hung
On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr 2024 Lucca, Serena
Alle Artikel auflisten