Darknet and deepnet mining for proactive cybersecurity threat intelligence E Nunes, A Diab, A Gunn, E Marin, V Mishra, V Paliath, J Robertson, ... 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 7-12, 2016 | 250 | 2016 |
Introduction to cyber-warfare: A multidisciplinary approach P Shakarian, J Shakarian, A Ruef Elsevier/Syngress, 2013 | 220 | 2013 |
A review of evolutionary graph theory with applications to game theory P Shakarian, P Roos, A Johnson Biosystems 107 (2), 66-80, 2012 | 178 | 2012 |
Early warnings of cyber threats in online discussions A Sapienza, A Bessi, S Damodaran, P Shakarian, K Lerman, E Ferrara 2017 IEEE International Conference on Data Mining Workshops (ICDMW), 667-674, 2017 | 107 | 2017 |
Darkembed: Exploit prediction with neural language models N Tavabi, P Goyal, M Almukaynizi, P Shakarian, K Lerman Proceedings of the AAAI Conference on Artificial Intelligence 32 (1), 2018 | 94 | 2018 |
Proactive identification of exploits in the wild through vulnerability mentions online M Almukaynizi, E Nunes, K Dharaiya, M Senguttuvan, J Shakarian, ... 2017 International Conference on Cyber Conflict (CyCon US), 82-88, 2017 | 86 | 2017 |
The independent cascade and linear threshold models P Shakarian, A Bhatnagar, A Aleali, E Shaabani, R Guo, P Shakarian, ... Diffusion in social networks, 35-48, 2015 | 81 | 2015 |
Darkweb cyber threat intelligence mining J Robertson, A Diab, E Marin, E Nunes, V Paliath, J Shakarian, ... Cambridge University Press, 2017 | 80 | 2017 |
Diffusion in social networks P Shakarian, A Bhatnagar, A Aleali, E Shaabani, R Guo Springer International Publishing, 2015 | 79 | 2015 |
The 2008 Russian cyber campaign against Georgia P Shakarian Military Review-English Edition 91 (6), 63, 2011 | 79 | 2011 |
Semi-supervised learning for detecting human trafficking H Alvari, P Shakarian, JEK Snyder Security Informatics 6, 1-14, 2017 | 78 | 2017 |
A non-parametric learning approach to identify online human trafficking H Alvari, P Shakarian, JEK Snyder 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 133-138, 2016 | 69 | 2016 |
A scalable heuristic for viral marketing under the tipping model P Shakarian, S Eyre, D Paulo Social Network Analysis and Mining 3, 1225-1248, 2013 | 62 | 2013 |
Stuxnet: Cyberwar revolution in military affairs P Shakarian Small Wars Journal, 2011 | 62 | 2011 |
Product offerings in malicious hacker markets E Marin, A Diab, P Shakarian 2016 IEEE conference on intelligence and security informatics (ISI), 187-189, 2016 | 58 | 2016 |
Large social networks can be targeted for viral marketing with small seed sets P Shakarian, D Paulo 2012 IEEE/ACM International Conference on Advances in Social Networks …, 2012 | 55 | 2012 |
Annotated probabilistic temporal logic P Shakarian, A Parker, G Simari, VS Subrahmanian ACM Transactions on Computational Logic (TOCL) 12 (2), 14, 2011 | 54 | 2011 |
A scalable framework for modeling competitive diffusion in social networks M Broecheler, P Shakarian, VS Subrahmanian 2010 IEEE Second International Conference on Social Computing, 295-302, 2010 | 51 | 2010 |
Mining key-hackers on darkweb forums E Marin, J Shakarian, P Shakarian 2018 1st International Conference on Data Intelligence and Security (ICDIS …, 2018 | 50 | 2018 |
An independent evaluation of ChatGPT on mathematical word problems (MWP) P Shakarian, A Koyyalamudi, N Ngu, L Mareedu arXiv preprint arXiv:2302.13814, 2023 | 48 | 2023 |