Subject: Computer Science - Computation and Language | dark web | Information technology | sentiment analysis | T58.5-58.64 | cyber-security
Recent high-profile cyber attacks exemplify why organizations need better cyber defenses. Cyber threats are hard to accurately predict because attackers usually try to mask their traces. However, they often discuss exploits and techniques on hacking forums. The communit... View more
 V. Dutt, Y.-S. Ahn, and C. Gonzalez, “Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory,” Human Factors, vol. 55, no. 3, pp. 605-618, 2013.
 S. Jajodia, P. Liu, V. Swarup, and C. Wang, Cyber situational awareness. Springer, 2009.
 U. Franke and J. Brynielsson, “Cyber situational awareness-a systematic review of the literature,” Computers & Security, vol. 46, pp. 18-31, 2014.
 S. Freud, “1960. the psychopathology of everyday life,” The standard edition of the complete psychological works of Sigmund Freud, vol. 6, 1901.
 B. Pang, L. Lee, and S. Vaithyanathan, “Thumbs up?: sentiment classification using machine learning techniques,” in Proceedings of the ACL-02 conference on Empirical methods in natural language processing-Volume 10, pp. 79-86, Association for Computational Linguistics, 2002.
 S. L. Pfleeger and D. D. Caputo, “Leveraging behavioral science to mitigate cyber security risk,” Computers & security, vol. 31, no. 4, pp. 597-611, 2012.
 S. Agarwal and A. Sureka, “Applying social media intelligence for predicting and identifying on-line radicalization and civil unrest oriented threats,” arXiv preprint arXiv:1511.06858, 2015.
 S. Asur and B. A. Huberman, “Predicting the future with social media,” in Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent TechnologyVolume 01, pp. 492-499, IEEE Computer Society, 2010.
 E. Kalampokis, E. Tambouris, and K. Tarabanis, “Understanding the predictive power of social media,” Internet Research, vol. 23, no. 5, pp. 544-559, 2013.
 R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The secondgeneration onion router,” tech. rep., Naval Research Lab Washington DC, 2004.