Sagar Samtani
According to our database1,
Sagar Samtani
authored at least 31 papers
between 2015 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2021
Fusion of heterogeneous attention mechanisms in multi-view convolutional neural network for text classification.
Inf. Sci., 2021
2020
Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF).
ACM Trans. Priv. Secur., 2020
Human Identification for Activities of Daily Living: A Deep Transfer Learning Approach.
J. Manag. Inf. Syst., 2020
Behavioral Biometrics for Continuous Authentication in the Internet-of-Things Era: An Artificial Intelligence Perspective.
IEEE Internet Things J., 2020
On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild.
Comput. Secur., 2020
Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Linking Personally Identifiable Information from the Dark Web to the Surface Web: A Deep Entity Resolution Approach.
Proceedings of the 20th International Conference on Data Mining Workshops, 2020
2019
Fear Appeals and Information Security Behaviors: An Empirical Study on Mechanical Turk.
AIS Trans. Replication Res., 2019
Identifying High-Impact Opioid Products and Key Sellers in Dark Net Marketplaces: An Interpretable Text Analytics Approach.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019
Proceedings of the 27th European Conference on Information Systems, 2019
2018
Developing Proactive Cyber Threat Intelligence from the Online Hacker Community: A Computational Design Science Approach.
PhD thesis, 2018
Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach.
IEEE Intell. Syst., 2018
Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning Approach.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Identifying, Collecting, and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMs.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
2017
Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence.
J. Manag. Inf. Syst., 2017
Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
2016
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
Using social network analysis to identify key hackers for keylogging tools in hacker forums.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
2015
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015