关注
Ghaith Husari
Ghaith Husari
PhD
在 uncc.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources
G Husari, E Al-Shaer, M Ahmed, B Chu, X Niu
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
2022017
Using NLP for cybersecurity. Extracting Cyber Attack Behaviors from Text
G Husari, E Al-Shaer, M Ahmed, B Chu, X Niu
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
202*2017
IoTSAT: A formal framework for security analysis of the internet of things (IoT)
M Mohsin, Z Anwar, G Husari, E Al-Shaer, MA Rahman
2016 IEEE conference on communications and network security (CNS), 180-188, 2016
1022016
Using entropy and mutual information to extract threat actions from cyber threat intelligence
G Husari, X Niu, B Chu, E Al-Shaer
2018 IEEE international conference on intelligence and security informatics …, 2018
692018
Machine learning approach for brain tumor detection
M Al-Ayyoub, G Husari, O Darwish, A Alabed-alaziz
Proceedings of the 3rd international conference on information and …, 2012
532012
Thor: A deep learning approach for face mask detection to prevent the COVID-19 pandemic
SE Snyder, G Husari
SoutheastCon 2021, 1-8, 2021
372021
Agile approaches for cybersecurity systems, IoT and intelligent transportation
YM Tashtoush, DA Darweesh, G Husari, OA Darwish, Y Darwish, LB Issa, ...
IEEE Access 10, 1360-1375, 2021
292021
Symptoms-based fuzzy-logic approach for COVID-19 diagnosis
M Shatnawi, A Shatnawi, Z AlShara, G Husari
International Journal of Advanced Computer Science and Applications 12 (4 …, 2021
282021
Learning APT Chains from Cyber Threat Intelligence
G Husari, E Al-Shaer, B Chu, RF Rahman
2019 Hot Topics in Science and Security (HotSoS 2019), 2019
272019
SnapCatch: automatic detection of covert timing channels using image processing and machine learning
S Al-Eidi, O Darwish, Y Chen, G Husari
IEEE Access 9, 177-191, 2020
242020
Roi-driven cyber risk mitigation using host compliance and network configuration
MN Alsaleh, E Al-Shaer, G Husari
Journal of Network and Systems Management 25, 759-783, 2017
112017
Machine learning algorithms and their applications in classifying cyber-attacks on a smart grid network
A Aribisala, MS Khan, G Husari
2021 IEEE 12th Annual Information Technology, Electronics and Mobile …, 2021
92021
Improving Vertical Handoffs Using Mobility Prediction
M Al-Ayyoub, G Husari, W Mardini
International Journal of Advanced Computer Science and Applications(IJACSA …, 2016
92016
Machine learning predictive analytics for player movement prediction in NBA: applications, opportunities, and challenges
DK Stephanos, G Husari, BT Bennett, E Stephanos
Proceedings of the 2021 ACM Southeast Conference, 2-8, 2021
72021
Towards improving channel switching in cognitive radio networks
E Kanan, G Husari, M Al-Ayyoub, Y Jararweh
2015 6th International Conference on Information and Communication Systems …, 2015
72015
SENA: preserving social structure for network embedding
S Hong, T Chakraborty, S Ahn, G Husari, N Park
Proceedings of the 28th ACM Conference on hypertext and social media, 235-244, 2017
52017
Optimizing the roi of cyber risk mitigation
MN Alsaleh, G Husari, E Al-Shaer
2016 12th International Conference on Network and Service Management (CNSM …, 2016
52016
Convolutional neural network structure to detect and localize ctc using image processing
S Al-Eidi, O Darwish, G Husari, Y Chen, M Elkhodr
2022 IEEE International IOT, Electronics and Mechatronics Conference …, 2022
42022
Feed-Forward Intrusion Detection and Classification on a Smart Grid Network
A Aribisala, MS Khan, G Husari
2022 IEEE 12th Annual Computing and Communication Workshop and Conference …, 2022
32022
A Data-Driven Password Strength Meter for Cybersecurity Assessment and Enhancement
MM Algharibeh, G Husari, S Jaf
2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th …, 2021
12021
系统目前无法执行此操作,请稍后再试。
文章 1–20