33 references, page 1 of 4 [1] V. Dutt, Y.-S. Ahn, and C. Gonzalez, “Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory,” Human Factors, vol. 55, no. 3, pp. 605-618, 2013.
[2] S. Jajodia, P. Liu, V. Swarup, and C. Wang, Cyber situational awareness. Springer, 2009.
[3] U. Franke and J. Brynielsson, “Cyber situational awareness-a systematic review of the literature,” Computers & Security, vol. 46, pp. 18-31, 2014.
[4] S. Freud, “1960. the psychopathology of everyday life,” The standard edition of the complete psychological works of Sigmund Freud, vol. 6, 1901.
[5] B. Pang, L. Lee, and S. Vaithyanathan, “Thumbs up?: sentiment classification using machine learning techniques,” in Proceedings of the ACL-02 conference on Empirical methods in natural language processing-Volume 10, pp. 79-86, Association for Computational Linguistics, 2002.
[6] S. L. Pfleeger and D. D. Caputo, “Leveraging behavioral science to mitigate cyber security risk,” Computers & security, vol. 31, no. 4, pp. 597-611, 2012.
[7] S. Agarwal and A. Sureka, “Applying social media intelligence for predicting and identifying on-line radicalization and civil unrest oriented threats,” arXiv preprint arXiv:1511.06858, 2015.
[8] S. Asur and B. A. Huberman, “Predicting the future with social media,” in Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent TechnologyVolume 01, pp. 492-499, IEEE Computer Society, 2010.
[9] E. Kalampokis, E. Tambouris, and K. Tarabanis, “Understanding the predictive power of social media,” Internet Research, vol. 23, no. 5, pp. 544-559, 2013.
[10] R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The secondgeneration onion router,” tech. rep., Naval Research Lab Washington DC, 2004.