Jana Shakarian

According to our database1, Jana Shakarian authored at least 14 papers between 2013 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Automated Corpus Annotation for Cybersecurity Named Entity Recognition with Small Keyword Dictionary.
Proceedings of the Intelligent Systems and Applications, 2021

2020
Human-Machine Interaction for Improved Cybersecurity Named Entity Recognition Considering Semantic Similarity.
Proceedings of the Intelligent Systems and Applications, 2020

2019
Mining user interaction patterns in the darkweb to predict enterprise cyber incidents.
Soc. Netw. Anal. Min., 2019

2018
Predicting Hacker Adoption on Darkweb Forums Using Sequential Rule Mining.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Mining Key-Hackers on Darkweb Forums.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

Predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums.
Proceedings of the 2018 International Conference on Cyber Conflict, 2018

2017
Crisis and Collective Problem Solving in Dark Web: An Exploration of a Black Hat Forum.
Proceedings of the 8th International Conference on Social Media & Society, 2017

Proactive identification of exploits in the wild through vulnerability mentions online.
Proceedings of the 2017 International Conference on Cyber Conflict, 2017

2016
Darknet and deepnet mining for proactive cybersecurity threat intelligence.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Socio-Cultural Modeling for Cyber Threat Actors.
Proceedings of the Artificial Intelligence for Cyber Security, 2016

Data Driven Game Theoretic Cyber Threat Mitigation.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Exploring Malicious Hacker Forums.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Cyber Attacks and Public Embarrassment: A Survey of Some Notable Hacks.
CoRR, 2015

2013
The Dragon and the Computer: Why Intellectual Property Theft is Compatible with Chinese Cyber-Warfare Doctrine.
CoRR, 2013


  Loading...