Skip to main content

Showing 1–2 of 2 results for author: Thart, A

.
  1. arXiv:1607.08583  [pdf, other

    cs.CR cs.AI cs.CY

    Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence

    Authors: Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin, Vineet Mishra, Vivin Paliath, John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian

    Abstract: In this paper, we present an operational system for cyber threat intelligence gathering from various social platforms on the Internet particularly sites on the darknet and deepnet. We focus our attention to collecting information from hacker forum discussions and marketplaces offering products and services focusing on malicious hacking. We have developed an operational system for obtaining informa… ▽ More

    Submitted 28 July, 2016; originally announced July 2016.

    Comments: 6 page paper accepted to be presented at IEEE Intelligence and Security Informatics 2016 Tucson, Arizona USA September 27-30, 2016

  2. arXiv:1508.01192  [pdf, other

    cs.CY cs.AI

    Mining for Causal Relationships: A Data-Driven Study of the Islamic State

    Authors: Andrew Stanton, Amanda Thart, Ashish Jain, Priyank Vyas, Arpan Chatterjee, Paulo Shakarian

    Abstract: The Islamic State of Iraq and al-Sham (ISIS) is a dominant insurgent group operating in Iraq and Syria that rose to prominence when it took over Mosul in June, 2014. In this paper, we present a data-driven approach to analyzing this group using a dataset consisting of 2200 incidents of military activity surrounding ISIS and the forces that oppose it (including Iraqi, Syrian, and the American-led c… ▽ More

    Submitted 5 August, 2015; originally announced August 2015.

    Journal ref: Final version presented at KDD 2015