Armin Sarabi

Orcid: 0000-0002-1431-7434

According to our database1, Armin Sarabi authored at least 13 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Scoring the Unscorables: Cyber Risk Assessment Beyond Internet Scans.
CoRR, June, 2025

2024
Analyzing Corporate Privacy Policies using AI Chatbots.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

2023
Deterrence, Backup, or Insurance: Game-Theoretic Modeling of Ransomware.
Games, 2023

An LLM-based Framework for Fingerprinting Internet-connected Devices.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

2018
From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild.
Proceedings of the 27th USENIX Security Symposium, 2018

Characterizing the Internet Host Population Using Deep Learning: A Universal and Lightweight Numerical Embedding.
Proceedings of the Internet Measurement Conference 2018, 2018

2017
Patch Me If You Can: A Study on the Effects of Individual User Behavior on the End-Host Vulnerability State.
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017

2016
Risky business: Fine-grained data breach prediction using business profiles.
J. Cybersecur., 2016

2015
Prioritizing Security Spending: A Quantitative Analysis of Risk Distributions for Different Business Profiles.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents.
Proceedings of the 24th USENIX Security Symposium, 2015

Predicting Cyber Security Incidents Using Feature-Based Characterization of Network-Level Malicious Activities.
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015

2014
Can Less Be More? A Game-Theoretic Analysis of Filtering vs. Investment.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014


  Loading...