Darknet and deepnet mining for proactive cybersecurity threat intelligence E Nunes, A Diab, A Gunn, E Marin, V Mishra, V Paliath, J Robertson, ... 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 7-12, 2016 | 278 | 2016 |
Introduction to cyber-warfare: A multidisciplinary approach P Shakarian, J Shakarian, A Ruef Newnes, 2013 | 229 | 2013 |
Proactive identification of exploits in the wild through vulnerability mentions online M Almukaynizi, E Nunes, K Dharaiya, M Senguttuvan, J Shakarian, ... 2017 International Conference on Cyber Conflict (CyCon US), 82-88, 2017 | 96 | 2017 |
Darkweb cyber threat intelligence mining J Robertson, A Diab, E Marin, E Nunes, V Paliath, J Shakarian, ... Cambridge University Press, 2017 | 83 | 2017 |
Computational analysis of terrorist groups: Lashkar-e-Taiba VS Subrahmanian, A Mannes, A Sliva, J Shakarian, JP Dickerson Springer New York, 2013 | 63 | 2013 |
Mining key-hackers on darkweb forums E Marin, J Shakarian, P Shakarian 2018 1st International Conference on Data Intelligence and Security (ICDIS …, 2018 | 56 | 2018 |
Exploring malicious hacker forums J Shakarian, AT Gunn, P Shakarian Cyber Deception: Building the Scientific Foundation, 259-282, 2016 | 46 | 2016 |
Predicting enterprise cyber incidents using social network analysis on dark web hacker forums S Sarkar, M Almukaynizi, J Shakarian, P Shakarian The Cyber Defense Review, 87-102, 2019 | 40 | 2019 |
Predicting cyber threats through hacker social networks in darkweb and deepweb forums M Almukaynizi, A Grimm, E Nunes, J Shakarian, P Shakarian Proceedings of the 2017 International Conference of The Computational Social …, 2017 | 35 | 2017 |
Patch before exploited: An approach to identify targeted software vulnerabilities M Almukaynizi, E Nunes, K Dharaiya, M Senguttuvan, J Shakarian, ... AI in Cybersecurity, 81-113, 2019 | 28 | 2019 |
Attacking iranian nuclear facilities: Stuxnet P Shakarian, J Shakarian, A Ruef Introduction to cyber-warfare: A multidisciplinary approach, 223-239, 2013 | 27 | 2013 |
Darknet mining and game theory for enhanced cyber threat intelligence J Robertson, A Diab, E Marin, E Nunes, V Paliath, J Shakarian, ... The Cyber Defense Review 1 (2), 95-122, 2016 | 25 | 2016 |
Data driven game theoretic cyber threat mitigation J Robertson, V Paliath, J Shakarian, A Thart, P Shakarian Proceedings of the AAAI Conference on Artificial Intelligence 30 (2), 4041-4046, 2016 | 22 | 2016 |
Mining user interaction patterns in the darkweb to predict enterprise cyber incidents S Sarkar, M Almukaynizi, J Shakarian, P Shakarian Social Network Analysis and Mining 9 (1), 57, 2019 | 20 | 2019 |
Predicting cyber threats through the dynamics of user connectivity in darkweb and deepweb forums M Almukaynizi, A Grimm, E Nunes, J Shakarian, P Shakarian ACM Computational Social Science, 2017 | 17 | 2017 |
A computationally-enabled analysis of Lashkar-e-Taiba attacks in Jammu and Kashmir A Mannes, J Shakarian, A Sliva, VS Subrahmanian 2011 European intelligence and security informatics conference, 224-229, 2011 | 17 | 2011 |
Systems and methods for data driven game theoretic cyber threat mitigation P Shakarian, J Robertson, J Shakarian, V Paliath, A Thart US Patent 10,313,385, 2019 | 16 | 2019 |
Predicting hacker adoption on darkweb forums using sequential rule mining E Marin, M Almukaynizi, E Nunes, J Shakarian, P Shakarian 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018 | 15 | 2018 |
Black-hat hackers’ crisis information processing in the darknet: A case study of cyber underground market shutdowns KH Kwon, J Shakarian Networks, Hacking, and Media–CITA MS@ 30: Now and Then and Tomorrow 17, 113-135, 2018 | 14 | 2018 |
Crisis and collective problem solving in dark web: An exploration of a black hat forum KH Kwon, JH Priniski, S Sarkar, J Shakarian, P Shakarian Proceedings of the 8th International Conference on Social Media & Society, 1-5, 2017 | 11 | 2017 |