Author of the publication

Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach.

, , , , and . ISI, page 1-6. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Disrupting Ransomware Actors on the Bitcoin Blockchain: A Graph Embedding Approach., , , and . ISI, page 1-6. IEEE, (2023)Performance Modeling of Hyperledger Sawtooth Blockchain., , and . ISI, page 59-61. IEEE, (2019)Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach., , , , and . ISI, page 1-6. IEEE, (2021)Benchmarking the Robustness of Phishing Email Detection Systems., , , , and . AMCIS, Association for Information Systems, (2023)The Effect of Consensus Algorithm on Ethereum Price and Volume.. AMCIS, Association for Information Systems, (2023)Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach., , , and . ISI, page 1-6. IEEE, (2021)Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach., , , , and . ISI, page 1-6. IEEE, (2020)Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach., , , , , , and . ISI, page 1-6. IEEE, (2020)Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Framework: A Multi-label Transformer Approach., , , and . ISI, page 1-6. IEEE, (2023)Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach., , , and . MIS Q., 48 (1): 137-166 (2024)