Part 3: Secuirty Management / ForensicInternational audienceIn the last couple of years, the number of software vulnerabilities and corresponding incidents increased significantly. In order to stay up-to-date about these new emerging threats, organizations have demonstrated an increased willingness to exchange information and knowledge about vulnerabilities, threats, incidents and countermeasures. Apart from dedicated sharing platforms or databases, information on vulnerabilities is frequently shared on Twitter and other social media platforms. So far, little is known about the obtainable time advantage of vulnerability information shared on social media platforms. To close this gap, we identified 709,880 relevant Tweets and subsequently an...
Online Social Networks (OSNs) such as Facebook and Twitter have become popular communication and inf...
Social media platforms are commonly employed by law enforcement agencies for collecting Open Source ...
The purpose of our research project is to examine how Twitter, the most popular microblogging site, ...
In recent years, the number of software vulnerabilities discovered has grown significantly. This cre...
Open Source Intelligence (OSINT) has taken the interest of cybersecurity practitioners due to its co...
Cybercrime is a growing threat for firms and customers that emerged with the digitization of busines...
How can Twitter be exploited to fulfill information needs of users on Twitter during incidents? In t...
While Twitter has been touted to provide up-to-date information about hazard events, the relevance a...
In this study we expose the serious large-scale threat of crim-inal account hijacking and the result...
Twitter has become one of the most popular microblogging sites for people to broadcast (or “tweet”) ...
The awareness about software vulnerabilities is crucial to ensure effective cybersecurity practices,...
This paper tests disruption strategies in Twitter networks contain-ing malicious URLs used in d...
Earlier when the internet was not there, rumours were spread by word of mouth technique but in this ...
Social media has been used as a tool for the dissemination and exchange of information among people ...
Using Twitter is not without risk. In a network that is, by design, intended to be fairly liberal re...
Online Social Networks (OSNs) such as Facebook and Twitter have become popular communication and inf...
Social media platforms are commonly employed by law enforcement agencies for collecting Open Source ...
The purpose of our research project is to examine how Twitter, the most popular microblogging site, ...
In recent years, the number of software vulnerabilities discovered has grown significantly. This cre...
Open Source Intelligence (OSINT) has taken the interest of cybersecurity practitioners due to its co...
Cybercrime is a growing threat for firms and customers that emerged with the digitization of busines...
How can Twitter be exploited to fulfill information needs of users on Twitter during incidents? In t...
While Twitter has been touted to provide up-to-date information about hazard events, the relevance a...
In this study we expose the serious large-scale threat of crim-inal account hijacking and the result...
Twitter has become one of the most popular microblogging sites for people to broadcast (or “tweet”) ...
The awareness about software vulnerabilities is crucial to ensure effective cybersecurity practices,...
This paper tests disruption strategies in Twitter networks contain-ing malicious URLs used in d...
Earlier when the internet was not there, rumours were spread by word of mouth technique but in this ...
Social media has been used as a tool for the dissemination and exchange of information among people ...
Using Twitter is not without risk. In a network that is, by design, intended to be fairly liberal re...
Online Social Networks (OSNs) such as Facebook and Twitter have become popular communication and inf...
Social media platforms are commonly employed by law enforcement agencies for collecting Open Source ...
The purpose of our research project is to examine how Twitter, the most popular microblogging site, ...