关注
Steven Ullman
标题
引用次数
引用次数
年份
Linking common vulnerabilities and exposures to the mitre att&ck framework: A self-distillation approach
B Ampel, S Samtani, S Ullman, H Chen
arXiv preprint arXiv:2108.01696, 2021
432021
Labeling hacker exploits for proactive cyber threat intelligence: A deep transfer learning approach
B Ampel, S Samtani, H Zhu, S Ullman, H Chen
2020 IEEE international conference on intelligence and security informatics …, 2020
382020
Identifying vulnerable GitHub repositories and users in scientific cyberinfrastructure: An unsupervised graph embedding approach
B Lazarine, S Samtani, M Patton, H Zhu, S Ullman, B Ampel, H Chen
2020 IEEE International Conference on Intelligence and Security Informatics …, 2020
252020
Smart vulnerability assessment for scientific cyberinfrastructure: An unsupervised graph embedding approach
S Ullman, S Samtani, B Lazarine, H Zhu, B Ampel, M Patton, H Chen
2020 IEEE International Conference on Intelligence and Security Informatics …, 2020
132020
The 4th Workshop on Artificial Intelligence-enabled Cybersecurity Analytics
S Ullman, BM Ampel, S Samtani, S Yang, H Chen
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and …, 2024
2024
Enhancing Vulnerability Prioritization in Cloud Computing Using Multi-View Representation Learning
S Ullman, S Samtani, H Zhu, B Lazarine, H Chen, JF Nunamaker Jr
Journal of Management Information Systems 41 (3), 708-743, 2024
2024
Artificial Intelligence-Enabled Vulnerability Analysis and Management for It Infrastructure: A Computational Design Science Approach
S Ullman
The University of Arizona, 2024
2024
Why Following Friends Can Hurt You: A Replication Study
BM Ampel, S Ullman
AIS Transactions on Replication Research 9 (1), 6, 2023
2023
系统目前无法执行此操作,请稍后再试。
文章 1–8