Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification Authors: Ba Dung Le, Guanhua Wang, Mehwish Nasim, Ali Babar | Published: 2019-07-03 | Updated: 2019-09-05 Automation of CybersecurityData Extraction and AnalysisInformation Gathering Methods 2019.07.03 2025.05.28 Literature Database
Fake News Detection on Social Media using Geometric Deep Learning Authors: Federico Monti, Fabrizio Frasca, Davide Eynard, Damon Mannion, Michael M. Bronstein | Published: 2019-02-10 Data Origins and EvolutionDetection of MisinformationInformation Gathering Methods 2019.02.10 2025.05.28 Literature Database
A Manually-Curated Dataset of Fixes to Vulnerabilities of Open-Source Software Authors: Serena E. Ponta, Henrik Plate, Antonino Sabetta, Michele Bezzi, Cédric Dangremont | Published: 2019-02-07 | Updated: 2019-03-19 Data Origins and EvolutionInformation Gathering MethodsVulnerability Mitigation Technique 2019.02.07 2025.05.28 Literature Database
Discovering Signals from Web Sources to Predict Cyber Attacks Authors: Palash Goyal, KSM Tozammel Hossain, Ashok Deb, Nazgol Tavabi, Nathan Bartley, Andr'es Abeliuk, Emilio Ferrara, Kristina Lerman | Published: 2018-06-08 CybersecurityInformation Gathering MethodsVulnerability Prediction 2018.06.08 2025.05.28 Literature Database