关注
Sagar Samtani
Sagar Samtani
Associate Professor & Arthur M. Weimer Fellow; Director, IU Kelley's Data Science and AI Lab
在 iu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence
S Samtani, R Chinn, H Chen, JF Nunamaker Jr
Journal of Management Information Systems 34 (4), 1023-1053, 2017
1912017
Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach
R Williams, E McMahon, S Samtani, M Patton, H Chen
2017 IEEE International Conference on Intelligence and Security Informatics …, 2017
1392017
Behavioral Biometrics for Continuous Authentication in the Internet of Things Era: An Artificial Intelligence Perspective
Y Liang, S Samtani, B Guo, Z Yu
IEEE Internet of Things Journal 7 (9), 9128 - 9143, 2020
1312020
Exploring hacker assets in underground forums
S Samtani, R Chinn, H Chen
2015 IEEE international conference on intelligence and security informatics …, 2015
1002015
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques
S Samtani, S Yu, H Zhu, M Patton, H Chen
2016 IEEE Conference on Intelligence and Security Informatics (ISI), 25-30, 2016
822016
On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild
MS Pour, A Mangino, K Friday, M Rathbun, E Bou-Harb, F Iqbal, ...
Computers & Security 91, 101707, 2020
802020
Assessing medical device vulnerabilities on the Internet of Things
E McMahon, R Williams, M El, S Samtani, M Patton, H Chen
2017 IEEE international conference on intelligence and security informatics …, 2017
762017
Cybersecurity as an industry: A cyber threat intelligence perspective
S Samtani, M Abate, V Benjamin, W Li
The Palgrave Handbook of International Cybercrime and Cyberdeviance, 135-154, 2020
722020
AZsecure Hacker Assets Portal: Cyber Threat Intelligence and Malware Analysis
S Samtani, K Chinn, C Larson, H Chen
2016 IEEE conference on intelligence and security informatics (ISI), 19-24, 2016
722016
Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF)
S Samtani, H Zhu, H Chen
ACM Transactions on Privacy and Security 23 (21), 1-33, 2020
632020
Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence
J Grisham, S Samtani, M Patton, H Chen
2017 IEEE international conference on intelligence and security informatics …, 2017
592017
Trailblazing the Artificial Intelligence for Cybersecurity Discipline: A Multi-Disciplinary Research Roadmap
S Samtani, M Kantarcioglu, H Chen
ACM Transactions on Management Information Systems 11 (4), 1-18, 2020
572020
Fusion of heterogeneous attention mechanisms in multi-view convolutional neural network for text classification
Y Liang, H Li, B Guo, Z Yu, X Zheng, S Samtani, DD Zeng
Information Sciences 548, 295-312, 2021
562021
Identifying SCADA systems and their vulnerabilities on the internet of things: A text-mining approach
S Samtani, S Yu, H Zhu, M Patton, J Matherly, H Chen
IEEE Intelligent Systems 33 (2), 63-73, 2018
56*2018
A deep learning approach for recognizing activity of daily living (ADL) for senior care: Exploiting interaction dependency and temporal patterns
H Zhu, S Samtani, R Brown, H Chen
MIS Quarterly 45 (2), 859-896, 2021
542021
AI for Security and Security for AI
E Bertino, M Kantarcioglu, CG Akcora, S Samtani, S Mittal, M Gupta
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
512021
Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-based Deep Structured Semantic Model
S Samtani, Y Chai, H Chen
MIS Quarterly 46 (2), 909-944, 2022
482022
Human Identification for Activities of Daily Living: A Deep Transfer Learning Approach
H Zhu, S Samtani, H Chen, JF Nunamaker Jr
Journal of Management Information Systems 37 (2), 457-483, 2020
482020
Incremental hacker forum exploit collection and classification for proactive cyber threat intelligence: An exploratory study
R Williams, S Samtani, M Patton, H Chen
2018 IEEE International Conference on Intelligence and Security Informatics …, 2018
412018
Identifying, collecting, and presenting hacker community data: Forums, IRC, carding shops, and DNMs
PY Du, N Zhang, M Ebrahimi, S Samtani, B Lazarine, N Arnold, R Dunn, ...
2018 IEEE international conference on intelligence and security informatics …, 2018
372018
系统目前无法执行此操作,请稍后再试。
文章 1–20