Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence S Samtani, R Chinn, H Chen, JF Nunamaker Jr Journal of Management Information Systems 34 (4), 1023-1053, 2017 | 191 | 2017 |
Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach R Williams, E McMahon, S Samtani, M Patton, H Chen 2017 IEEE International Conference on Intelligence and Security Informatics …, 2017 | 139 | 2017 |
Behavioral Biometrics for Continuous Authentication in the Internet of Things Era: An Artificial Intelligence Perspective Y Liang, S Samtani, B Guo, Z Yu IEEE Internet of Things Journal 7 (9), 9128 - 9143, 2020 | 131 | 2020 |
Exploring hacker assets in underground forums S Samtani, R Chinn, H Chen 2015 IEEE international conference on intelligence and security informatics …, 2015 | 100 | 2015 |
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques S Samtani, S Yu, H Zhu, M Patton, H Chen 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 25-30, 2016 | 82 | 2016 |
On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild MS Pour, A Mangino, K Friday, M Rathbun, E Bou-Harb, F Iqbal, ... Computers & Security 91, 101707, 2020 | 80 | 2020 |
Assessing medical device vulnerabilities on the Internet of Things E McMahon, R Williams, M El, S Samtani, M Patton, H Chen 2017 IEEE international conference on intelligence and security informatics …, 2017 | 76 | 2017 |
Cybersecurity as an industry: A cyber threat intelligence perspective S Samtani, M Abate, V Benjamin, W Li The Palgrave Handbook of International Cybercrime and Cyberdeviance, 135-154, 2020 | 72 | 2020 |
AZsecure Hacker Assets Portal: Cyber Threat Intelligence and Malware Analysis S Samtani, K Chinn, C Larson, H Chen 2016 IEEE conference on intelligence and security informatics (ISI), 19-24, 2016 | 72 | 2016 |
Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF) S Samtani, H Zhu, H Chen ACM Transactions on Privacy and Security 23 (21), 1-33, 2020 | 63 | 2020 |
Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence J Grisham, S Samtani, M Patton, H Chen 2017 IEEE international conference on intelligence and security informatics …, 2017 | 59 | 2017 |
Trailblazing the Artificial Intelligence for Cybersecurity Discipline: A Multi-Disciplinary Research Roadmap S Samtani, M Kantarcioglu, H Chen ACM Transactions on Management Information Systems 11 (4), 1-18, 2020 | 57 | 2020 |
Fusion of heterogeneous attention mechanisms in multi-view convolutional neural network for text classification Y Liang, H Li, B Guo, Z Yu, X Zheng, S Samtani, DD Zeng Information Sciences 548, 295-312, 2021 | 56 | 2021 |
Identifying SCADA systems and their vulnerabilities on the internet of things: A text-mining approach S Samtani, S Yu, H Zhu, M Patton, J Matherly, H Chen IEEE Intelligent Systems 33 (2), 63-73, 2018 | 56* | 2018 |
A deep learning approach for recognizing activity of daily living (ADL) for senior care: Exploiting interaction dependency and temporal patterns H Zhu, S Samtani, R Brown, H Chen MIS Quarterly 45 (2), 859-896, 2021 | 54 | 2021 |
AI for Security and Security for AI E Bertino, M Kantarcioglu, CG Akcora, S Samtani, S Mittal, M Gupta Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021 | 51 | 2021 |
Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-based Deep Structured Semantic Model S Samtani, Y Chai, H Chen MIS Quarterly 46 (2), 909-944, 2022 | 48 | 2022 |
Human Identification for Activities of Daily Living: A Deep Transfer Learning Approach H Zhu, S Samtani, H Chen, JF Nunamaker Jr Journal of Management Information Systems 37 (2), 457-483, 2020 | 48 | 2020 |
Incremental hacker forum exploit collection and classification for proactive cyber threat intelligence: An exploratory study R Williams, S Samtani, M Patton, H Chen 2018 IEEE International Conference on Intelligence and Security Informatics …, 2018 | 41 | 2018 |
Identifying, collecting, and presenting hacker community data: Forums, IRC, carding shops, and DNMs PY Du, N Zhang, M Ebrahimi, S Samtani, B Lazarine, N Arnold, R Dunn, ... 2018 IEEE international conference on intelligence and security informatics …, 2018 | 37 | 2018 |