ISC/DShield Related Research Papers
We are always eager to collaborate with researchers, and all of our data will be made accessible to researchers. For more details, see this page about our research feed. Much of our data can also simply be accessed via our API without requiring any support from us. (time is limited... and support may be slow depending on what else is going on :( ...)
Missing a paper? Let us know here. Papers are semi-random sorted.
Png, Ivan PL, Chen-Yu Wang, and Qiu-Hong Wang. "The deterrent and displacement effects of information security enforcement: International evidence." Journal of Management Information Systems 25, no. 2 (2008): 125-144.
Chen, Z., Ji, C., & Barford, P. (2008, April). Spatial-temporal characteristics of internet malicious sources. In IEEE INFOCOM 2008-The 27th Conference on Computer Communications (pp. 2306-2314). IEEE.
Srivastava, Shashi Kant, Saini Das, Godwin J. Udo, and Kallol Bagchi. "Determinants of Cybercrime Originating within a Nation: A Cross-country Study." Journal of Global Information Technology Management (2020): 1-26.
Burton, Renée, and Laura Rocha. "Whitelists that Work: Creating Defensible Dynamic Whitelists with Statistical Learning." In 2019 APWG Symposium on Electronic Crime Research (eCrime), pp. 1-10. IEEE, 2019.
Cohen, Dvir, Yisroel Mirsky, Yuval Elovici, Rami Puzis, Manuel Kamp, Tobias Martin, and Asaf Shabtai. "DANTE: A framework for mining and monitoring darknet traffic." arXiv preprint arXiv:2003.02575 (2020).