[1] |
LI Ying, CHENG Jiaxing, HUANG Cheng, et al. NEDetector: Automatically Extracting Cybersecurity Neologisms from Hacker Forums[J]. Journal of Information Security and Applications, 2021, 58(5): 102784-102797.
doi: 10.1016/j.jisa.2021.102784
URL
|
[2] |
NATARAJAN N, SEN P, CHAOJI V. Community Detection in Content-Sharing Social Networks[C]// IEEE. 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. New York: IEEE, 2013: 82-89.
|
[3] |
SHI Huaijing. Research on Online Public Opinion Management Mechanism of Public Security Emergencies in Micro-Communication Environment[D]. Chongqing: Sichuan International Studies University, 2019.
|
|
石怀静. 微传播环境下突发公共安全事件网络舆情管理机制研究[D]. 重庆: 四川外国语大学, 2019.
|
[4] |
TEO L X, LENG H K, PHUA Y X P. Marketing on Instagram: Social Influence and Image Quality on Perception of Quality and Purchase Intention[J]. International Journal of Sports Marketing and Sponsorship, 2019, 20(2): 321-332.
doi: 10.1108/IJSMS-04-2018-0028
URL
|
[5] |
BERAHMAND K, NASIRI E, FOROUZANDEH S, et al. A Preference Random Walk Algorithm for Link Prediction Through Mutual Influence Nodes in Complex Networks[J]. Journal of King Saud University-Computer and Information Sciences, 2022, 34(8): 5375-5387.
doi: 10.1016/j.jksuci.2021.05.006
URL
|
[6] |
VERBERT K, MANOUSELIS N, OCHOA X, et al. Context-Aware Recommender Systems for Learning: a Survey and Future Challenges[J]. IEEE Transactions on Learning Technologies, 2012, 5(4): 318-335.
doi: 10.1109/TLT.2012.11
URL
|
[7] |
HOLT T J. Examining the Forces Shaping Cybercrime Markets Online[J]. Social Science Computer Review, 2013, 31(2): 165-177.
doi: 10.1177/0894439312452998
URL
|
[8] |
PETE I, HUGHES J, CHUA Y T, et al. A Social Network Analysis and Comparison of Six Dark Web Forums[C]// IEEE. IEEE European Symposium on Security and Privacy. New York: IEEE, 2020: 484-493.
|
[9] |
HUANG Cheng, GUO Yongyan, GUO Wenbo, et al. HackerRank: Identifying Key Hackers in Underground Forums[EB/OL]. (2021-05-04)[2022-10-17]. https://doi.org/10.1177/15501477211015145.htm.
|
[10] |
GRISHAM J, SAMTANI S, PATTON M, et al. Identifying Mobile Malware and Key Threat Actors in Online Hacker Forums for Proactive Cyber Threat Intelligence[C]// IEEE. 15th IEEE International Conference on Intelligence and Security Informatics-Security and Big Data (ISI). New York: IEEE, 2017: 13-18.
|
[11] |
MARIN E, SHAKARIAN J, SHAKARIAN P. Mining Key-Hackers on Darkweb Forums[C]// IEEE. 1st International Conference on Data Intelligence and Security (ICDIS). New York: IEEE, 2018: 73-80.
|
[12] |
ZHANG Yiming, FAN Yujie, YE Yanfang, et al. KADetector: Automatic Identification of Key Actors in Online Hack Forums Based on Structured Heterogeneous Information Network[C]// IEEE. 9th IEEE International Conference on Big Knowledge (ICBK). New York: IEEE, 2018: 154-161.
|
[13] |
HE Dongxiao, SONG Yue, JIN Di, et al. Community-Centric Graph Convolutional Network for Unsupervised Community Detection[C]// IJCAI. 29th International Joint Conference on Artificial Intelligence. San Francisco: IJCAI, 2021: 3515-3521.
|
[14] |
JIN Di, LIU Ziyang, LI Weihao, et al. Graph Convolutional Networks Meet Markov Random Fields: Semi-Supervised Community Detection in Attribute Networks[C]// Assoc Advancement Artificial Intelligence. 33rd AAAI Conference on Artificial Intelligence. New York: AAAI, 2019: 152-159.
|
[15] |
BABKO-MALAYA O, CATHEY R, HINTON S, et al. Detection of Hacking Behaviors and Communication Patterns on Social Media[C]// IEEE. IEEE International Conference on Big Data (IEEE Big Data). New York: IEEE, 2017: 4636-4641.
|
[16] |
FANG Zhen, ZHAO Xinyi, WEI Qiang, et al. Exploring Key Hackers and Cybersecurity Threats in Chinese Hacker Communities[C]// IEEE. 14th IEEE International Conference on Intelligence and Security Informatics-Cybersecurity and Big Data (IEEE ISI). New York: IEEE, 2016: 13-18.
|