Title
Who shall we follow in twitter for cyber vulnerability?
Abstract
Twitter has become a key social media for sharing information, not only for casual conversations but also for business and technologies. As the Twitter community continues to grow, an intriguing question is to determine how to obtain most valuable information the earliest by following fewest Tweeters or Tweets. This multi-criteria optimization problem exhibits similar features as in the information cascade problem for blogs. This work revises an information cascade outbreak detection algorithm to find critical Twitter accounts that disseminate the most cyber vulnerabilities the earliest. Three award functions are defined to evaluate every account's contribution per topic from three aspects: timeliness, originality and influence. Critical users are selected according to their total contribution on a specific security category. Experiments were conducted using Tweets containing CVE information over a five-week period, to compare the proposed algorithm with account selections based on the number of followers and based on the PageRank algorithm. The results show that with the same number of users and tweets, our algorithm outperforms in both information coverage and timeliness.
Year
DOI
Venue
2013
10.1007/978-3-642-37210-0_43
SBP
Keywords
Field
DocType
account selection,critical twitter account,cyber vulnerability,information coverage,cve information,information cascade outbreak detection,twitter community,information cascade problem,proposed algorithm,pagerank algorithm,valuable information
Information coverage,Data mining,Internet privacy,World Wide Web,Social media,Computer science,Information cascade,Originality,Dissemination,Casual,Optimization problem,Vulnerability
Conference
Citations 
PageRank 
References 
4
0.68
8
Authors
4
Name
Order
Citations
PageRank
Biru Cui141.36
Stephen Moskal253.73
Haitao Du3556.88
Shanchieh Jay Yang413123.11