Follow
Jana Shakarian
Jana Shakarian
Assistant Research Technologist, ASU
Verified email at asu.edu - Homepage
Title
Cited by
Cited by
Year
Darknet and deepnet mining for proactive cybersecurity threat intelligence
E Nunes, A Diab, A Gunn, E Marin, V Mishra, V Paliath, J Robertson, ...
2016 IEEE Conference on Intelligence and Security Informatics (ISI), 7-12, 2016
2782016
Introduction to cyber-warfare: A multidisciplinary approach
P Shakarian, J Shakarian, A Ruef
Newnes, 2013
2292013
Proactive identification of exploits in the wild through vulnerability mentions online
M Almukaynizi, E Nunes, K Dharaiya, M Senguttuvan, J Shakarian, ...
2017 International Conference on Cyber Conflict (CyCon US), 82-88, 2017
962017
Darkweb cyber threat intelligence mining
J Robertson, A Diab, E Marin, E Nunes, V Paliath, J Shakarian, ...
Cambridge University Press, 2017
832017
Computational analysis of terrorist groups: Lashkar-e-Taiba
VS Subrahmanian, A Mannes, A Sliva, J Shakarian, JP Dickerson
Springer New York, 2013
632013
Mining key-hackers on darkweb forums
E Marin, J Shakarian, P Shakarian
2018 1st International Conference on Data Intelligence and Security (ICDIS …, 2018
562018
Exploring malicious hacker forums
J Shakarian, AT Gunn, P Shakarian
Cyber Deception: Building the Scientific Foundation, 259-282, 2016
462016
Predicting enterprise cyber incidents using social network analysis on dark web hacker forums
S Sarkar, M Almukaynizi, J Shakarian, P Shakarian
The Cyber Defense Review, 87-102, 2019
402019
Predicting cyber threats through hacker social networks in darkweb and deepweb forums
M Almukaynizi, A Grimm, E Nunes, J Shakarian, P Shakarian
Proceedings of the 2017 International Conference of The Computational Social …, 2017
352017
Patch before exploited: An approach to identify targeted software vulnerabilities
M Almukaynizi, E Nunes, K Dharaiya, M Senguttuvan, J Shakarian, ...
AI in Cybersecurity, 81-113, 2019
282019
Attacking iranian nuclear facilities: Stuxnet
P Shakarian, J Shakarian, A Ruef
Introduction to cyber-warfare: A multidisciplinary approach, 223-239, 2013
272013
Darknet mining and game theory for enhanced cyber threat intelligence
J Robertson, A Diab, E Marin, E Nunes, V Paliath, J Shakarian, ...
The Cyber Defense Review 1 (2), 95-122, 2016
252016
Data driven game theoretic cyber threat mitigation
J Robertson, V Paliath, J Shakarian, A Thart, P Shakarian
Proceedings of the AAAI Conference on Artificial Intelligence 30 (2), 4041-4046, 2016
222016
Mining user interaction patterns in the darkweb to predict enterprise cyber incidents
S Sarkar, M Almukaynizi, J Shakarian, P Shakarian
Social Network Analysis and Mining 9 (1), 57, 2019
202019
Predicting cyber threats through the dynamics of user connectivity in darkweb and deepweb forums
M Almukaynizi, A Grimm, E Nunes, J Shakarian, P Shakarian
ACM Computational Social Science, 2017
172017
A computationally-enabled analysis of Lashkar-e-Taiba attacks in Jammu and Kashmir
A Mannes, J Shakarian, A Sliva, VS Subrahmanian
2011 European intelligence and security informatics conference, 224-229, 2011
172011
Systems and methods for data driven game theoretic cyber threat mitigation
P Shakarian, J Robertson, J Shakarian, V Paliath, A Thart
US Patent 10,313,385, 2019
162019
Predicting hacker adoption on darkweb forums using sequential rule mining
E Marin, M Almukaynizi, E Nunes, J Shakarian, P Shakarian
2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018
152018
Black-hat hackers’ crisis information processing in the darknet: A case study of cyber underground market shutdowns
KH Kwon, J Shakarian
Networks, Hacking, and Media–CITA MS@ 30: Now and Then and Tomorrow 17, 113-135, 2018
142018
Crisis and collective problem solving in dark web: An exploration of a black hat forum
KH Kwon, JH Priniski, S Sarkar, J Shakarian, P Shakarian
Proceedings of the 8th International Conference on Social Media & Society, 1-5, 2017
112017
The system can't perform the operation now. Try again later.
Articles 1–20