Who shall we follow in Twitter for cyber vulnerability?

6Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Twitter has become a key social media for sharing information, not only for casual conversations but also for business and technologies. As the Twitter community continues to grow, an intriguing question is to determine how to obtain most valuable information the earliest by following fewest Tweeters or Tweets. This multi-criteria optimization problem exhibits similar features as in the information cascade problem for blogs. This work revises an information cascade outbreak detection algorithm to find critical Twitter accounts that disseminate the most cyber vulnerabilities the earliest. Three award functions are defined to evaluate every account's contribution per topic from three aspects: timeliness, originality and influence. Critical users are selected according to their total contribution on a specific security category. Experiments were conducted using Tweets containing CVE information over a five-week period, to compare the proposed algorithm with account selections based on the number of followers and based on the PageRank algorithm. The results show that with the same number of users and tweets, our algorithm outperforms in both information coverage and timeliness. © 2013 Springer-Verlag.

Cite

CITATION STYLE

APA

Cui, B., Moskal, S., Du, H., & Yang, S. J. (2013). Who shall we follow in Twitter for cyber vulnerability? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7812 LNCS, pp. 394–402). https://doi.org/10.1007/978-3-642-37210-0_43

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free