How can we identify similar repositories and clusters among a large onli...
We consider the problem of inferring the mobility map, which is the
dist...
How can we expand the tensor decomposition to reveal a hierarchical stru...
How can we get a security forum to "tell" us its activities and events o...
Authors of malicious software are not hiding as much as one would assume...
Where can we find malware source code? This question is motivated by a r...
How can we extract useful information from a security forum? We focus on...
Is it possible to extract malicious IP addresses reported in security fo...