Sagar Samtani

According to our database1, Sagar Samtani authored at least 31 papers between 2015 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Fusion of heterogeneous attention mechanisms in multi-view convolutional neural network for text classification.
Inf. Sci., 2021

2020
Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF).
ACM Trans. Priv. Secur., 2020

Human Identification for Activities of Daily Living: A Deep Transfer Learning Approach.
J. Manag. Inf. Syst., 2020

Behavioral Biometrics for Continuous Authentication in the Internet-of-Things Era: An Artificial Intelligence Perspective.
IEEE Internet Things J., 2020

Deep Learning for Information Systems Research.
CoRR, 2020

On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild.
Comput. Secur., 2020

Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Linking Personally Identifiable Information from the Dark Web to the Surface Web: A Deep Entity Resolution Approach.
Proceedings of the 20th International Conference on Data Mining Workshops, 2020

2019
Fear Appeals and Information Security Behaviors: An Empirical Study on Mechanical Turk.
AIS Trans. Replication Res., 2019

Identifying High-Impact Opioid Products and Key Sellers in Dark Net Marketplaces: An Interpretable Text Analytics Approach.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Dark-Net Ecosystem Cyber-Threat Intelligence (CTI) Tool.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Rocket ship or Blimp? - Implications of Malicious Accounts removal on Twitter.
Proceedings of the 27th European Conference on Information Systems, 2019

2018
Developing Proactive Cyber Threat Intelligence from the Online Hacker Community: A Computational Design Science Approach.
PhD thesis, 2018

Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach.
IEEE Intell. Syst., 2018

Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning Approach.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Identifying, Collecting, and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMs.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

2017
Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence.
J. Manag. Inf. Syst., 2017

Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Assessing medical device vulnerabilities on the Internet of Things.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

2016
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Using social network analysis to identify key hackers for keylogging tools in hacker forums.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

2015
Exploring hacker assets in underground forums.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015


  Loading...