(Cyber Security) OR Cybersecurity, Twitter, 10/13/2020 7:11:00 AM, 237878


FAQ | Problem?

(Cyber Security) OR Cybersecurity_2020-10-12_23-25-28.xlsx
(Cyber Security) OR Cybersecurity_2020-10-12_23-25-28.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
October 13, 2020
Short Description:
(Cyber Security) OR Cybersecurity via NodeXL https://bit.ly/34Sc65J
@cybersec_feeds
@kornelij
@cyscol
@vishne0
@cybersecurityn8
@sectest9
@cybersecuritysf
@infosecawa
@sourabhskatoch
@gdprai

Top hashtags:
#cybersecurity
#infosec
#security
#machinelearning
#iot

Description:
Description
The graph represents a network of 5,821 Twitter users whose tweets in the requested range contained "(Cyber Security) OR Cybersecurity", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Tuesday, 13 October 2020 at 06:45 UTC.

The requested start date was Tuesday, 13 October 2020 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 7,500.

The tweets in the network were tweeted over the 2-day, 0-hour, 42-minute period from Friday, 09 October 2020 at 14:28 UTC to Sunday, 11 October 2020 at 15:11 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 5821
Unique Edges : 4190
Edges With Duplicates : 14518
Total Edges : 18708
Number of Edge Types : 5
Retweet : 5452
MentionsInRetweet : 6934
Tweet : 2589
Mentions : 3562
Replies to : 171
Self-Loops : 2721
Reciprocated Vertex Pair Ratio : 0.0157491098329225
Reciprocated Edge Ratio : 0.0310098422542807
Connected Components : 1231
Single-Vertex Connected Components : 718
Maximum Vertices in a Connected Component : 3393
Maximum Edges in a Connected Component : 15446
Maximum Geodesic Distance (Diameter) : 14
Average Geodesic Distance : 4.385877
Graph Density : 0.000218931218936532
Modularity : 0.364355
NodeXL Version : 1.0.1.441
Data Import : The graph represents a network of 5,821 Twitter users whose tweets in the requested range contained "(Cyber Security) OR Cybersecurity", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Tuesday, 13 October 2020 at 06:45 UTC.

The requested start date was Tuesday, 13 October 2020 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 7,500.

The tweets in the network were tweeted over the 2-day, 0-hour, 42-minute period from Friday, 09 October 2020 at 14:28 UTC to Sunday, 11 October 2020 at 15:11 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : GraphServerTwitterSearch
Graph Term : (Cyber Security) OR Cybersecurity
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[70] https://twinybots.ch/
[52] https://www.deeplearning.ai/machine-learning-yearning/
[48] https://medium.com/towards-artificial-intelligence/start-machine-learning-in-2020-become-an-expert-from-nothing-for-free-f31587630cf7
[35] https://www.washingtonpost.com/national-security/cyber-command-trickbot-disrupt/2020/10/09/19587aae-0a32-11eb-a166-dc429b380d10_story.html
[34] https://medium.com/swlh/the-evolving-role-of-information-in-high-speed-trading-68d9be3c5995
[30] https://www.elkadegitall.com/2020/10/i-will-develop-twitter-bot-for-your.html
[29] https://www.techrepublic.com/article/3-ways-criminals-use-artificial-intelligence-in-cybersecurity-attacks/
[28] https://www.youtube.com/watch?v=jGL24-p_OBI&feature=youtu.be

[27] https://www.elkadegitall.com/2020/10/i-will-build-twitter-api-app-or-bot.html
[22] https://johannesdrooghaag.com/

Top URLs in Tweet in G1:
[44] https://twinybots.ch/
[38] https://www.deeplearning.ai/machine-learning-yearning/
[26] https://medium.com/swlh/the-evolving-role-of-information-in-high-speed-trading-68d9be3c5995
[22] https://johannesdrooghaag.com/
[21] https://medium.com/towards-artificial-intelligence/start-machine-learning-in-2020-become-an-expert-from-nothing-for-free-f31587630cf7
[20] https://udemy.com/course/complete-outlier-detection-algorithms-a-z-in-data-science/?couponCode=1D643D018DF44A712AB1
[19] https://www.elkadegitall.com/2020/10/i-will-develop-twitter-bot-for-your.html
[18] https://www.elkadegitall.com/2020/10/i-will-build-twilio-sms-bot-or-bulk-sms.html
[16] https://www.youtube.com/watch?v=jGL24-p_OBI&feature=youtu.be

[16] https://us17.campaign-archive.com/?u=e3cb8b09ffc9f1d8c791043d4&id=2d284638c8

Top URLs in Tweet in G2:
[9] https://www.washingtonpost.com/national-security/cyber-command-trickbot-disrupt/2020/10/09/19587aae-0a32-11eb-a166-dc429b380d10_story.html
[5] https://twinybots.ch/
[4] https://channelbuzz.ca/2020/10/october-is-national-cyber-security-awareness-month-34990/
[4] https://sites.ziftsolutions.com/extremenetworks.ziftsolutions.com/8ac3296b540f7f1d015410dbb4342572?cid=8a99824774f5451e0174fa61637e215e&url=https%3A%2F%2Ftechcrunch.com%2F2020%2F09%2F28%2Funiversal-health-services-ransomware%2F
[3] https://thenextweb.com/syndication/2020/10/09/its-never-too-early-to-teach-your-kids-about-cybersecurity/
[3] https://www.techrepublic.com/article/3-ways-criminals-use-artificial-intelligence-in-cybersecurity-attacks/
[3] https://staysafeonline.org/cybersecurity-awareness-month/
[3] https://codario.io:443/
[3] https://www.startuprad.io/blog/codario-io-makes-open-source-security-easy/?utm_content=buffer1b9ed&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[2] https://StaySafeOnline.org/

Top URLs in Tweet in G3:
[15] https://twinybots.ch/
[13] https://cyberstartupobservatory.com/download-observatory-all/
[13] https://twitter.com/aneeshnair/status/1315279153134854147
[8] https://cyberstartupobservatory.com/infographics-iot-iiot/
[8] https://www.securitymadesimple.org/cybersecurity-blog/what-is-ransomware
[7] https://phishstats.info/
[7] https://cyberstartupobservatory.com/infographics-managed-security-services/
[7] https://cyberstartupobservatory.com/infographics-transportation/
[7] https://essentials.news/cybersecurity/threats-and-attacks/article?url=https://www.zdnet.com/article/cohesity-on-ransomware-ofac-sanctions-its-time-to-bring-cybersecurity-to-gdpr-levels/
[7] https://www.csoonline.com/article/3574907/wastedlocker-explained-how-this-targeted-ransomware-extorts-millions-from-victims.html?utm_content=content&utm_medium=social&utm_campaign=organic&utm_source=twitter

Top URLs in Tweet in G4:
[1] https://www.exploitone.com/data-breach/anonymous-defaces-turkish-parliament-website-in-support-of-armenia/

Top URLs in Tweet in G5:
[27] https://medium.com/towards-artificial-intelligence/start-machine-learning-in-2020-become-an-expert-from-nothing-for-free-f31587630cf7
[11] https://www.elkadegitall.com/2020/10/i-will-build-twitter-api-app-or-bot.html
[11] https://www.elkadegitall.com/2020/10/i-will-develop-twitter-bot-for-your.html
[10] https://www.youtube.com/watch?v=jGL24-p_OBI&feature=youtu.be

[10] https://www.deeplearning.ai/machine-learning-yearning/
[10] https://hakin9.org/final-recon-osint-tool-for-all-in-one-web-reconnaissance/
[8] https://statanalytica.com/blog/statistics-test/
[7] https://analyticsindiamag.com/top-8-machine-learning-tools-for-cybersecurity/
[6] https://medium.com/@FEhrsam/blockchain-based-machine-learning-marketplaces-cb2d4dae2c17
[6] https://medium.com/swlh/the-evolving-role-of-information-in-high-speed-trading-68d9be3c5995

Top URLs in Tweet in G6:
[2] https://www.moneycontrol.com/news/business/personal-finance/know-your-rights-to-fend-off-recovery-bullies-unleashed-by-fintech-lenders-5427931.html
[1] https://twitter.com/Sandeepkr_1/status/1305551455873449984
[1] https://www.dsci.in/content/NCSAM/2020
[1] https://redteamhackeracademy.blogspot.com/2020/10/certified-penetration-tester-in-india.html
[1] https://docs.google.com/forms/d/e/1FAIpQLSdV7n6h-sOn62Byl7JW1EXITgx88AI_9Ww3y7N9n0RP7roI1A/viewform?usp=pp_url
[1] https://twitter.com/elitecisos/status/1314782185551998976
[1] https://twitter.com/Cyberdost/status/1314182842633482240
[1] https://www.cybercrime.gov.in/
[1] https://dataprotection.link/ce541670
[1] https://news.microsoft.com/en-in/features/cybershikshaa-bridging-indias-cybersecurity-gender-gap/?ocid=AID3022438_TWITTER_oo_spl100001555897417

Top URLs in Tweet in G7:
[6] https://buff.ly/3lqfuvw
[4] https://buff.ly/2GQZYK4
[4] https://go.usa.gov/xGtDH
[3] https://buff.ly/3le0eS5
[2] https://go.usa.gov/xGzQG
[2] https://www.us-cert.gov/forms/report
[2] https://www.fbi.gov/ncsam
[2] https://buff.ly/3nuMjck
[2] https://www.eventbrite.ca/e/bsides-calgary-2020-tickets-92409827281
[1] https://www.cisa.gov/live

Top URLs in Tweet in G8:
[8] https://www.welivesecurity.com/2020/10/09/55-security-flaws-found-various-apple-services/?utm_source=dlvr.it&utm_medium=twitter
[6] https://www.wired.com/story/single-sign-on-facebook-google-apple/
[5] https://threatpost.com/feds-alarm-emotet-attacks-state-local/159954/?utm_source=dlvr.it&utm_medium=twitter
[5] https://www.forbes.com/sites/kateoflahertyuk/2020/10/08/android-users-beware-delete-these-240-malicious-apps-now/
[4] https://www.welivesecurity.com/2020/10/08/chrome-android-ios-can-now-tell-you-if-your-password-has-been-stolen/?utm_source=dlvr.it&utm_medium=twitter
[4] https://securityaffairs.co/wordpress/109296/intelligence/belgium-proximus-replaces-huawei.html?utm_source=dlvr.it&utm_medium=twitter&utm_campaign=belgium-proximus-replaces-huawei
[4] https://www.forbes.com/sites/leemathews/2020/10/09/beware-prime-day-shoppers-fraudsters-are-ramping-up-attacks/
[3] https://threatpost.com/google-chrome-86-critical-payments-bug-password-check/159938/?utm_source=dlvr.it&utm_medium=twitter
[3] https://www.infosecurity-magazine.com/news/cyber-espionage-bahamut-staggering/?utm_source=dlvr.it&utm_medium=twitter
[3] https://www.infosecurity-magazine.com/news/remote-workers-keep-it-issues-to/?utm_source=dlvr.it&utm_medium=twitter

Top URLs in Tweet in G9:
[19] https://security.umbrella.com/technical-paper-the-role-of-predictive-intelligence-gated?utm_medium=social-paid&utm_source=twitter&utm_campaign=cs-fy2021-q1-technical-paper-the-role-of-predictive-intelligence-apj-india&utm_term=pgm-secure-rank&utm_content=cs-fy2017-q1-technical-paper-the-role-of-predictive-intelligence
[12] https://security.umbrella.com/technical-paper-the-role-of-predictive-intelligence-gated?utm_medium=social-paid&utm_source=twitter&utm_campaign=cs-fy21-q1-technical-paper-the-role-of-predictive-intelligence-Africa&utm_term=pgm-secure-rank&utm_content=cs-fy21-q1-technical-paper-the-role-of-predictive-intelligence
[8] https://www.iiba.org:443/cybersecurity
[4] http://www.iiba.org/cybersecurity
[3] https://events.ismg.io/event/cybersecurity-and-fraud-summit-chicago-il-2020/
[2] https://bit.ly/30Q2WFA
[2] https://www.thetimes.co.uk/article/contact-tracing-data-harvested-from-pubs-and-restaurants-being-sold-on-s0d85mkrr
[1] https://bit.ly/366XBLP
[1] https://www.emt.ae/vulnerability-report-2020/
[1] https://zcu.io/WJcz

Top URLs in Tweet in G10:
[2] https://africanwis.net/
[2] https://arstechnica.com/?p=1713174
[2] https://securityaffairs.co/wordpress/109308/data-breach/carnival-data-breach.html?utm_source=rss&utm_medium=rss&utm_campaign=carnival-data-breach
[2] https://home.edweb.net/webinar/supers20201012/
[1] https://twitter.com/uni_of_essex/status/1313833278869307393
[1] http://cyberweek.africa
[1] https://www.prnewswire.com/news-releases/wire-launches-next-generation-video-conferencing-platform-to-challenge-zoom-and-microsoft-teams-301146231.html
[1] https://www.business2community.com/cybersecurity/types-of-cyber-attacks-a-closer-look-at-common-threats-02352772
[1] https://news.psu.edu/story/634593/2020/10/07/academics/ist-cybersecurity-program-helps-meet-global-security-demand#.X39MVFFvwRc.twitter
[1] https://soundcloud.com/cybercrimemagazine/tracks

Top Domains
Top Domains in Tweet in Entire Graph:
[304] bit.ly
[241] medium.com
[217] twitter.com
[169] buff.ly
[147] youtube.com
[120] zdnet.com
[114] elkadegitall.com
[96] lnkd.in
[77] co.uk
[70] twinybots.ch

Top Domains in Tweet in G1:
[135] medium.com
[95] twitter.com
[88] bit.ly
[88] buff.ly
[82] elkadegitall.com
[80] youtube.com
[52] zdnet.com
[48] keepnetlabs.com
[44] twinybots.ch
[38] deeplearning.ai

Top Domains in Tweet in G2:
[73] bit.ly
[31] lnkd.in
[31] twitter.com
[21] buff.ly
[16] ziftsolutions.com
[15] washingtonpost.com
[14] co.uk
[11] staysafeonline.org
[11] youtube.com
[8] medium.com

Top Domains in Tweet in G3:
[54] cyberstartupobservatory.com
[31] twitter.com
[30] bit.ly
[27] buff.ly
[23] zdnet.com
[21] youtube.com
[21] helpnetsecurity.com
[20] lnkd.in
[19] linkedin.com
[17] tiny.cc

Top Domains in Tweet in G4:
[1] exploitone.com

Top Domains in Tweet in G5:
[62] medium.com
[31] elkadegitall.com
[30] hakin9.org
[18] youtube.com
[14] statanalytica.com
[11] google.com
[10] deeplearning.ai
[9] bit.ly
[7] analyticsindiamag.com
[7] github.com

Top Domains in Tweet in G6:
[3] twitter.com
[2] moneycontrol.com
[1] dsci.in
[1] blogspot.com
[1] google.com
[1] gov.in
[1] dataprotection.link
[1] microsoft.com
[1] india.com

Top Domains in Tweet in G7:
[16] buff.ly
[8] usa.gov
[3] fbi.gov
[3] bit.ly
[2] us-cert.gov
[2] cisa.gov
[2] cisecurity.org
[2] eventbrite.ca
[1] newscast-pratyaksha.com
[1] techrepublic.com

Top Domains in Tweet in G8:
[39] darkreading.com
[28] zdnet.com
[27] infosecurity-magazine.com
[27] welivesecurity.com
[27] forbes.com
[22] securityaffairs.co
[20] threatpost.com
[18] csoonline.com
[14] thehackernews.com
[8] krebsonsecurity.com

Top Domains in Tweet in G9:
[31] umbrella.com
[14] iiba.org
[12] bit.ly
[3] ismg.io
[2] co.uk
[2] twitter.com
[1] emt.ae
[1] zcu.io
[1] youtu.be
[1] cybereason.com

Top Domains in Tweet in G10:
[5] securityaffairs.co
[3] soundcloud.com
[2] twitter.com
[2] africanwis.net
[2] arstechnica.com
[2] edweb.net
[1] cyberweek.africa
[1] prnewswire.com
[1] business2community.com
[1] psu.edu

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[4529] cybersecurity
[1199] infosec
[651] security
[649] machinelearning
[606] iot
[403] 100daysofcode
[402] ai
[377] python
[350] ransomware
[335] malware



Top Hashtags in Tweet in G1:
[1932] cybersecurity
[541] infosec
[372] iot
[363] machinelearning
[358] security
[235] 100daysofcode
[228] ai
[209] python
[185] ransomware
[184] bigdata

Top Hashtags in Tweet in G2:
[352] cybersecurity
[60] becybersmart
[51] security
[47] cybersecurityawarenessmonth
[34] infosec
[27] ransomware
[25] cyber
[18] privacy
[17] malware
[16] technology

Top Hashtags in Tweet in G3:
[595] cybersecurity
[218] infosec
[101] security
[92] ransomware
[64] cybercrime
[59] informationsecurity
[57] malware
[43] technology
[41] hacking
[40] infosecurity

Top Hashtags in Tweet in G4:
[317] cybersecurity
[311] armenian
[311] azerbaijan
[6] infosec
[6] hacking
[6] security

Top Hashtags in Tweet in G5:
[245] machinelearning
[185] cybersecurity
[160] iot
[159] 100daysofcode
[157] python
[120] bigdata
[80] ai
[78] rstats
[78] javascript
[78] coding

Top Hashtags in Tweet in G6:
[48] ncsam2020
[23] cybersecurity
[15] ncsam
[6] awareness
[5] cybercrime
[3] cyberattack
[3] cybersecurityawarenessmonth
[2] datasecurity
[2] savethem
[2] databreach

Top Hashtags in Tweet in G7:
[39] cybersecurity
[9] becybersmart
[8] infosec
[8] china
[8] terrorism
[7] mcafee
[5] covid19
[5] dataprotection
[5] cyber
[4] cybersecurityawarenessmonth

Top Hashtags in Tweet in G8:
[352] cybersecurity
[234] infosec
[170] digital
[153] hackers
[88] malware
[87] dataprotection
[85] cloud
[83] privacy
[80] cloudsecurity
[66] security

Top Hashtags in Tweet in G9:
[23] cybersecurity
[16] becybersmart
[11] cybersecurityanalysis
[8] cyberthreats
[7] risks
[7] threats
[7] organization
[6] cybersecurityawareness
[5] ismgsummits
[3] nasscomfutureskills

Top Hashtags in Tweet in G10:
[44] cybersecurity
[25] cybercrime
[21] radio
[21] podcast
[14] interpol
[3] edwebinar
[2] datascience
[2] ai
[2] machinelearning
[2] becybersmart

Top Words
Top Words in Tweet in Entire Graph:
[4502] #cybersecurity
[1550] security
[1424] cyber
[1397] cybersecurity
[1165] #infosec
[1096] ø
[860] ù
[647] #security
[611] attacks
[593] #iot

Top Words in Tweet in G1:
[1913] #cybersecurity
[532] #infosec
[419] security
[379] gt
[364] #iot
[355] #security
[332] #machinelearning
[304] cyber
[264] cybersecurity
[235] #100daysofcode

Top Words in Tweet in G2:
[352] #cybersecurity
[270] cybersecurity
[205] security
[186] cyber
[117] ø
[87] more
[86] month
[77] ù
[76] awareness
[60] #becybersmart

Top Words in Tweet in G3:
[595] #cybersecurity
[209] #infosec
[143] security
[122] cyber
[113] cybersecurity
[100] #security
[92] #ransomware
[69] data
[64] #cybercrime
[55] #malware

Top Words in Tweet in G4:
[317] #cybersecurity
[311] #armenian
[311] hackers
[311] reported
[311] several
[311] successful
[311] attacks
[311] #azerbaijan
[311] banking
[311] system

Top Words in Tweet in G5:
[201] #machinelearning
[183] #cybersecurity
[159] #100daysofcode
[155] #iot
[153] #python
[120] µð
[116] #bigdata
[108] sourabhskatoch
[94] learning
[78] #rstats

Top Words in Tweet in G6:
[134] cyber
[126] security
[121] awareness
[117] month
[113] national
[112] ncsam
[48] #ncsam2020
[38] àª
[37] infosecawa
[35] indiancert

Top Words in Tweet in G7:
[67] fbi
[54] cybersecurity
[42] uscert_gov
[40] released
[40] vulnerabilities
[39] #cybersecurity
[38] security
[37] passphrase
[36] w0rds_d0n't_hav3_2_b_th
[36] s_complic

Top Words in Tweet in G8:
[351] #cybersecurity
[220] #infosec
[198] reach2ratan
[168] #digital
[148] #hackers
[88] #malware
[87] #dataprotection
[85] #cloud
[83] #privacy
[79] #cloudsecurity

Top Words in Tweet in G9:
[55] ciscoumbrella
[37] cybersecurity
[34] against
[34] iiba
[34] cyber
[33] intelligence
[32] fight
[31] role
[31] predictive
[31] attacks

Top Words in Tweet in G10:
[44] #cybersecurity
[36] cybersecurity
[26] cybersecuritysf
[25] #cybercrime
[23] listen
[21] miss
[21] episode
[21] #radio
[21] #podcast
[21] keep

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[734] cyber,security
[419] ø,ù
[390] ø,ø
[378] ù,ø
[324] î,î
[321] #cybersecurity,#infosec
[321] awareness,month
[319] system,#cybersecurity
[318] #armenian,hackers
[317] successful,attacks

Top Word Pairs in Tweet in G1:
[179] #cybersecurity,#infosec
[160] cyber,security
[147] gt,gt
[125] #cybersecurity,#security
[104] machine,learning
[98] #machinelearning,#100daysofcode
[86] #infosec,#cybersecurity
[81] #news,#cybersecurity
[75] #iot,#internetofthings
[73] #cyberattacks,#cybersecurity

Top Word Pairs in Tweet in G2:
[98] cyber,security
[54] awareness,month
[49] cybersecurity,awareness
[42] ø,ù
[41] ø,ø
[30] ù,ø
[28] learn,more
[21] ù,ù
[20] national,cybersecurity
[16] security,awareness

Top Word Pairs in Tweet in G3:
[72] #cybersecurity,#infosec
[43] #infosec,#cybersecurity
[41] press,quality
[37] cyber,security
[28] available,download
[26] download,press
[23] read,more
[22] #infosec,#informationsecurity
[22] data,breach
[22] virtual,conference

Top Word Pairs in Tweet in G4:
[311] #armenian,hackers
[311] hackers,reported
[311] reported,several
[311] several,successful
[311] successful,attacks
[311] attacks,#azerbaijan
[311] #azerbaijan,banking
[311] banking,system
[311] system,#cybersecurity
[308] kornelij,#armenian

Top Word Pairs in Tweet in G5:
[80] µð,µð
[60] machine,learning
[58] #iot,#100daysofmlcode
[57] #bigdata,#analytics
[52] #100daysofcode,#machinelearning
[48] #machinelearning,#iot
[48] #programming,#coding
[45] #python,#rstats
[43] #coding,#bigdata
[42] #100daysofmlcode,#python

Top Word Pairs in Tweet in G6:
[123] cyber,security
[116] security,awareness
[114] awareness,month
[112] national,cyber
[112] month,ncsam
[34] infosecawa,national
[33] àª,àª
[21] ncsam,2020
[19] ncsam,pibhomeaffairs
[19] pibhomeaffairs,cbseindia29

Top Word Pairs in Tweet in G7:
[36] w0rds_d0n't_hav3_2_b_th,s_complic
[36] s_complic,ted
[36] ted,consider
[36] consider,making
[36] making,password
[36] password,passphrase
[36] passphrase,length
[36] length,beats
[36] beats,complexity
[36] complexity,creating

Top Word Pairs in Tweet in G8:
[168] #cybersecurity,#digital
[146] #digital,#hackers
[113] #hackers,#infosec
[85] #infosec,reach2ratan
[83] reach2ratan,#malware
[81] #malware,#cloud
[79] #cloud,#cloudsecurity
[79] #cloudsecurity,#dataprotection
[79] #dataprotection,#privacy
[79] #privacy,#infosec

Top Word Pairs in Tweet in G9:
[32] fight,against
[31] role,predictive
[31] predictive,intelligence
[31] intelligence,fight
[31] against,cyber
[31] cyber,attacks
[29] ciscoumbrella,role
[14] learn,visibility
[14] visibility,internet
[14] internet,requests

Top Word Pairs in Tweet in G10:
[21] miss,episode
[21] episode,#cybercrime
[21] #cybercrime,#radio
[21] #radio,#podcast
[21] #podcast,keep
[21] keep,cutting
[21] cutting,edge
[21] edge,#cybersecurity
[21] #cybersecurity,listen
[20] cybersecuritysf,miss

Top Replied-To
Top Replied-To in Entire Graph:
@iotcommunity
@cyberdefensemag
@jennypotts
@csgspace
@cioonline
@realdonaldtrump
@anirbanganguly
@dilipghoshbjp
@cnn
@smaksked

Top Replied-To in G1:
@iotcommunity
@csgspace
@cioonline
@smaksked
@alxbrsn
@bigbasket_com
@oaicgov
@sonyliv
@wired
@searchsecurity

Top Replied-To in G2:
@wvsom
@raffa_aghemo

Top Replied-To in G3:
@nullbyte

Top Replied-To in G6:
@aucyble
@dsci_connect
@rbisays

Top Replied-To in G7:
@davereaboi
@tuomorusila

Top Replied-To in G8:
@forbes

Top Replied-To in G9:
@iyaboawokoya
@ciscoumbrella

Top Replied-To in G10:
@hacks4pancakes

Top Mentioned
Top Mentioned in Entire Graph:
@kornelij
@sourabhskatoch
@reach2ratan
@tamalot16
@cloudpreacher
@drjdrooghaag
@rvp
@kcore_analytics
@cybersecboardrm
@fisheyebox

Top Mentioned in G1:
@sourabhskatoch
@drjdrooghaag
@tamalot16
@rvp
@kcore_analytics
@paula_piccard
@onalytica
@ingliguori
@corix_jc
@iotcommunity

Top Mentioned in G2:
@raffa_aghemo
@isitceurope
@startups_observ
@davidappelbaum4
@talkwithtechfr1
@nephosec

Top Mentioned in G3:
@aneeshnair
@reach2ratan
@eccouncil
@cyberstartupobs
@iam__network
@jmonteagudoe
@carbonite
@itempathy
@cybersec_guy_it
@helpnetsecurity

Top Mentioned in G4:
@kornelij
@webimprints
@amaysor

Top Mentioned in G5:
@sourabhskatoch
@fisheyebox
@cloudpreacher
@tamalot16
@hakin9
@r_demidchuk
@pinakilaskar
@coding_monkeys
@couponed_code
@ingliguori

Top Mentioned in G6:
@infosecawa
@indiancert
@ts_womensafety
@ahmedabadpolice
@goi_meity
@pibhomeaffairs
@telanganacops
@cbseindia29
@ncert
@ciet_ncert

Top Mentioned in G7:
@fbi
@uscert_gov
@cisagov
@legalscoop
@newscastglobal
@canantifraud
@am4transparency
@cisecurity
@thejusticedept

Top Mentioned in G8:
@reach2ratan
@cybersecboardrm
@forbes
@nistcyber
@infosecuritymag
@m_lahierre
@licittech
@moreyhaber
@cybernews_com

Top Mentioned in G9:
@ciscoumbrella
@iiba
@computersociety
@eset
@erichkron
@policeng
@cequenceai
@cybereason
@checkmarx
@ciscosecure

Top Mentioned in G10:
@cybersecuritysf
@interpol_cyber
@hacks4pancakes
@cyberinafrica
@africanwis
@cosn
@ann_mcmullan
@luvelleb
@suptenfield
@paddlingsupt

Top Tweeters
Top Tweeters in Entire Graph:
@informacija
@sectest9
@paoloigna1
@huskorkut
@robre62
@monicasloves
@ejlazar
@raymond_norman
@cyberdomain
@chidambara09

Top Tweeters in G1:
@chidambara09
@cybersec_feeds
@aaroncuddeback
@iam__network
@femtech_
@lorimoreno
@ottlegalrebels
@bizitalk
@xaelbot
@rvp

Top Tweeters in G2:
@raymond_norman
@techl0g
@it_securitynews
@vernapolitics
@stackdevjobs
@markmichdomnic
@ajblackston
@cryptocryptone3
@cwindley
@nerd_junkie_

Top Tweeters in G3:
@sectest9
@evanderburg
@cybersecurityn8
@agedchild003
@robert_hove
@vivmilano
@bexxmodd
@youranonriots
@techjunkiejh
@digitaldecoded1

Top Tweeters in G4:
@betigulceylan
@5y5t3m_3rr0r
@gppr0d
@davohoops
@lil_desperado_
@muvaffakiyet
@girl6991
@oulosp
@abedross
@kornelij

Top Tweeters in G5:
@cyberdomain
@itknowingness
@calcaware
@netsecu
@llnuxbot
@dataaugmented
@yvesmulkers
@victormatara
@ml_tweet_bot
@maximamaximum

Top Tweeters in G6:
@moneycontrolcom
@uppolice
@mumbaipolice
@zee24kalak
@noidapolice
@srbachchan
@hydcitypolice
@npci_bhim
@mohfw_india
@pbns_india

Top Tweeters in G7:
@robre62
@roripierpont1
@adekleine
@onyourturntable
@1ladyhawk12
@developersdojo
@susanvermazen
@omi_082
@chiefcovfefe
@carobailey864

Top Tweeters in G8:
@ssxman2
@lkafle
@forbes
@lesguer_lionel
@drferdowsi
@silentseawolf
@mikeymikedoha
@ovidiug
@jrobertson
@jeffreyawillia4

Top Tweeters in G9:
@pitarampal
@nikhilkanoje6
@jeetbairagi1
@khomarahasan
@iyaboawokoya
@itsskr15
@reynald93063819
@mepiyush_
@germanhitechhe1
@newlove_eney

Top Tweeters in G10:
@goaudax
@skype
@linuxmil
@feenielives4him
@hacks4pancakes
@rajgoel_ny
@aglongo
@simoncocking
@infosecsherpa
@largecardinal


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.