The diffusion of malicious content on Twitter and its impact on security

Y Roumani - Information & Management, 2024 - Elsevier
While Twitter remains one of the most popular social media networks within the information
security community, threat actors continue to abuse the platform to create, share, and spread …

Towards practical cybersecurity map** of stride and cwe—a multi-perspective approach

A Honkaranta, T Leppänen… - 2021 29th Conference of …, 2021 - ieeexplore.ieee.org
Cybersecurity practitioners seek to prevent software vulnerabilities during the whole life-
cycle of systems. Threat modeling which is done on the system design phase is an efficient …

Content and interaction-based map** of Reddit posts related to information security

K Charmanas, N Mittas, L Angelis - Journal of Computational Social …, 2024 - Springer
Ensuring the privacy and safety of platform users has become a complex objective due to
the emerging threats that surround any type of network, software, and hardware. Scams …

An LSTM model for predicting cross-platform bursts of social media activity

N Hajiakhoond Bidoki, AV Mantzaris, G Sukthankar - Information, 2019 - mdpi.com
Burst analysis and prediction is a fundamental problem in social network analysis, since
user activities have been shown to have an intrinsically bursty nature. Bursts may also be a …

Extracting vulnerabilities from github commits

N Chan, JA Chandy - 2022 IEEE International Conference on …, 2022 - ieeexplore.ieee.org
Open-source libraries save developers time and effort by providing them access to pre-
written functions, objects, and methods. The adoption of such libraries follows the current …

Correlation between github stars and code vulnerabilities

MS Naveed - Journal of Computing & Biomedical Informatics, 2022 - jcbi.org
In the software industry, open-source repositories are widely utilized to speed up software
development. GitHub is a big source of open-source repositories and offers users to star the …

Towards cyber awareness among smart device users: an interactive, educational display of IoT device vendors compromise history

G Varma, R Chauhan, D Singh - Multimedia Tools and Applications, 2024 - Springer
In recent history, individual-owned devices were used to launch widespread botnet attacks
like Mirai. it is therefore critically needed to educate potential buyers about cyber …

College Students' Experiences with Social Media Information Sharing and Sexting, Bullying, and Cyberstalking: A Qualitative Phenomenological Study

JE Noel - 2021 - search.proquest.com
Social media has become a crucial form of communication and social interaction. However,
users are often unaware of the possible ramifications of using social media platforms or how …

Study on Vulnerability in Online Social Networking: Impact on an Individual, Community

S Agrawal, HR Sah - Online Social Networks in Business …, 2024 - Wiley Online Library
There is no doubt that social networking platforms have become one of the most important
aspects of modern living as they have made it easy for users to interact, discuss, and share …

A study of synergy between programming practices evolution and information disclosure-causing vulnerabilities

G Varma - Iran Journal of Computer Science, 2024 - Springer
Abstract The Common Vulnerabilities and Exposures (CVE) is a formal dictionary of
vulnerabilities and associated weaknesses reported by the community. As programming …