SFS Publications

AZSecure students gain not only a practical education in information assurance, cybersecurity, and management information systems, but also fully participate in the research process. In addition, our SFS students’ independent studies and thesis work are expected to result in a conference or journal publication. Our faculty also actively publish in the areas of cybersecurity and information assurance.  Below is a sampling of relevant publications.  See also the Cybersecurity Research and Education page on the website of the Artificial Intelligence Lab for additional background and information.

2015 Publications

(1) Sagar Samtani, Ryan Chinn and Hsinchun Chen. Exploring Hacker Assets in Underground Forums. ISI 2015, Proceedings of 2015 IEEE International Conference on Intelligence and Security Informatics, Baltimore, Md., May 27-29, 2015.

2014 Publications

(1)   Mark Patton, Eric Gross, Ryan Chinn, Samantha Forbis, Leon Walker, Hsinchun Chen. “Uninvited Connections.” IEEE Joint International Conference on Intelligence and Security Informatics (JISIC).  The Hague, The Netherlands, September 24-26, 2014.

(2)   Danny Thebeau II; Benjamin Reidy; Ricardo Valerdi; Avinash Gudagi; Hemayamini Kurra; Youssif Al-Nashif; Salim Hariri; Frederick Sheldon. “Improving cyber resiliency of cloud application services by applying Software Behavior Encryption (SBE).” Procedia Computer Science, 2014; 28:62-70.

(3)   V. Benjamin, H. Chen, “Machine Learning for Attack Vector Identification in Malicious Source Code,” Proceedings of 2013 IEEE International Conference on Intelligence and Security Informatics, ISI 2013, Seattle, Washington, June 4-7.

(4)   V. Benjamin and H. Chen, “Securing Cyberspace: Identifying Key Actors in Hacker Communities,” Proceedings of 2012 IEEE International  Conference on Intelligence and Security Informatics, ISI 2012, Washington, DC, June 2012.

Additional Publications--Books:

  • H. Chen, “Dark Web: Exploring and Mining the Dark Side of the Web,” Springer, 2012.
  • H. Chen, “Intelligence and Security Informatics for International Security: Information Sharing and Data Mining,” Springer, 2006.
  • H. Chen, M. Dacier, et al., (Eds.), Proceedings the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, Paris, France, June 2009.

Additional Publications: Journal and Conference--Papers:

  • V. Benjamin and H. Chen, “Machine Learning for Attack Vector identification in Malicious Source Code,” Proceedings of 2013 IEEE International Conference on Intelligence and Security Informatics, ISI 2013, Seattle, Washington, June 2013.
  • V. Benjamin and H. Chen, “Securing Cyberspace: Identifying Key Actors in Hacker Communities,” Proceedings of 2012 IEEE International Conference on Intelligence and Security Informatics, ISI 2012, Washington, DC, June 2012.
  • D. Zimbra and H. Chen, “Scalable Sentiment Classification across Multiple Dark Web Forums,” IEEE International Conference on Intelligence and Security Informatics, ISI 2012, Washington, DC, June 2012.
  • T. J. Fu, A. Abbasi, and H. Chen, “A Focused Crawler for Dark Web Forums,” Journal of the American Society for Information Science and Technology, Volume 61, Number 6, Pages 1213-1231, 2010.
  • A. Abbasi and H. Chen, “A Comparison of Tools for Detecting Fake Websites,” IEEE Computer, Volume 42, Number 10, Pages 78-86, October 2009.
  • A. Abbasi and H. Chen, “A Comparison of Fraud Cues and Classification Methods for Fake Escrow Website Detection,” Information Technology and Management, Volume 10, Number 2, Pages 83-101, 2009.
  • C. Mielke and H. Chen, “Botnets, and the CyberCriminal Underground,” Proceedings of 2008 IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 2008.
  • T. Fu and H. Chen, “Analysis of Cyberactivism: A Case Study of Online Free Tibet Activities,” Proceedings of 2008 IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 2008.
  • H. Chen, “Cyber Terrorism in Web 2.0: An Exploratory Study of International Jihadist Groups,” Proceedings of 2008 IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 2008.
  • A. Abbasi and H. Chen, “Writeprints: A Stylometric Approach to Identify-Level Identification and Similarity Detection in Cyberspace,” ACM Transactions on Information Systems, Volume 26, Number 2, Pages 7:1-7:29, 2008.
  • A. Abbasi, H. Chen, and A. Salem, “Sentiment Analysis in Multiple Languages: Feature Selection for Opinion Classification in Web Forums,” ACM Transactions on Information Systems, Volume 26, Number 3, Pages 12:1-12:34, 2008.
  • A. Abbasi, H. Chen, S. Thoms, and T. J. Fu, “Affect Analysis of Web Forums and Blogs using Correlation Ensembles,” IEEE Transactions on Knowledge and Data Engineering, Volume 20, Number 9, Pages 1168-1180, September 2008.
  • A. Abbasi and H. Chen, “CyberGate: A System and Design for Text Analysis of Computer Mediated Communications,” MIS Quarterly, Volume 32, Number 4, Pages 811-837, December 2008.
  • H. Chen, “Sentiment and Affect Analysis of Dark Web Forums: Measuring Radicalization on the Internet,” Proceedings of 2008 IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 2008.
  • T. Fu, A. Abbasi and H. Chen, “Interaction Coherence for Dark Web Forums,” Proceedings of 2007 IEEE Intelligence and Security Informatics, ISI 2007, New Brunswick, NJ, May 2007.
  • A. Abbasi and H. Chen, “Affect Intensity Analysis of Dark Web Forums,” Proceedings of 2007 IEEE Intelligence and Security Informatics, ISI 2007, New Brunswick, NJ, May 2007T.
  • S. Raghu and H. Chen, “Cyberinfrastructure for Homeland Security: Advances in Information Sharing, Data Mining, and Collaboration Systems,” Decision Support Systems, Volume 43, Number 4, Pages 1321-1323, 2007.
  • W. Chung, H. Chen, W. Chang, and S. Chou, “Fighting Cybercrime: A Review and the Taiwan Experience,” Decision Support Systems, special issue on Intelligence and Security Informatics, forthcoming, Volume 41, Number 3, Pages 669-682, March 2006.
  • R. Zheng, Y. Qin, Z. Huang, and H. Chen, “Authorship Analysis in Cybercrime Investigation,” Proceedings of the 1st NSF/NIJ Symposium on Intelligence and Security Informatics, ISI 2003, Tucson, Arizona, June 2003, Lecture Notes in Computer Science (LNCS 2665), Springer-Verlag.
  • R. Chang, W. Chung and H. Chen, “An International Perspective on Fighting Cybercrime,” Proceedings of the 1st NSF/NIJ Symposium on Intelligence and Security Informatics, ISI 2003, Tucson, Arizona, June 2003, Lecture Notes in Computer Science (LNCS 2665), Springer-Verlag.