Ttpdrill: Automatic and accurate extraction of threat actions from unstructured text of cti sources G Husari, E Al-Shaer, M Ahmed, B Chu, X Niu Proceedings of the 33rd annual computer security applications conference …, 2017 | 263 | 2017 |
gextractor: Towards automated extraction of malware deception parameters MN Alsaleh, J Wei, E Al-Shaer, M Ahmed Proceedings of the 8th Software Security, Protection, and Reverse …, 2018 | 13 | 2018 |
Statistical learning of apt ttp chains from mitre att&ck R Al-Shaer, M Ahmed, E Al-Shaer Proc. RSA Conf, 1-2, 2018 | 8 | 2018 |
A poisoning attack against cryptocurrency mining pools M Ahmed, J Wei, Y Wang, E Al-Shaer Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2018 | 7 | 2018 |
Measures and metrics for the enforcement of critical security controls: a case study of boundary defense M Ahmed, E Al-Shaer Proceedings of the 6th Annual Symposium on Hot Topics in the Science of …, 2019 | 6 | 2019 |
SCAHunter: Scalable Threat Hunting Through Decentralized Hierarchical Monitoring Agent Architecture M Ahmed, J Wei, E Al-Shaer Science and Information Conference, 1282-1307, 2023 | 2 | 2023 |
Ushoshi2023 at BLP-2023 Task 2: A Comparison of Traditional to Advanced Linguistic Models to Analyze Sentiment in Bangla Texts S Khushbu, N Nur, M Ahmed, N Nur Proceedings of the First Workshop on Bangla Language Processing (BLP-2023 …, 2023 | 1 | 2023 |
Prompting LLM to Enforce and Validate CIS Critical Security Control M Ahmed, J Wei, E Al-Shaer Proceedings of the 29th ACM Symposium on Access Control Models and …, 2024 | | 2024 |
Distributed hierarchical event monitoring for security analytics M Ahmed University of North Carolina at Charlotte, 2024 | | 2024 |