Linking common vulnerabilities and exposures to the mitre att&ck framework: A self-distillation approach B Ampel, S Samtani, S Ullman, H Chen arXiv preprint arXiv:2108.01696, 2021 | 43 | 2021 |
Labeling hacker exploits for proactive cyber threat intelligence: A deep transfer learning approach B Ampel, S Samtani, H Zhu, S Ullman, H Chen 2020 IEEE international conference on intelligence and security informatics …, 2020 | 38 | 2020 |
Identifying vulnerable GitHub repositories and users in scientific cyberinfrastructure: An unsupervised graph embedding approach B Lazarine, S Samtani, M Patton, H Zhu, S Ullman, B Ampel, H Chen 2020 IEEE International Conference on Intelligence and Security Informatics …, 2020 | 25 | 2020 |
Smart vulnerability assessment for scientific cyberinfrastructure: An unsupervised graph embedding approach S Ullman, S Samtani, B Lazarine, H Zhu, B Ampel, M Patton, H Chen 2020 IEEE International Conference on Intelligence and Security Informatics …, 2020 | 13 | 2020 |
The 4th Workshop on Artificial Intelligence-enabled Cybersecurity Analytics S Ullman, BM Ampel, S Samtani, S Yang, H Chen Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and …, 2024 | | 2024 |
Enhancing Vulnerability Prioritization in Cloud Computing Using Multi-View Representation Learning S Ullman, S Samtani, H Zhu, B Lazarine, H Chen, JF Nunamaker Jr Journal of Management Information Systems 41 (3), 708-743, 2024 | | 2024 |
Artificial Intelligence-Enabled Vulnerability Analysis and Management for It Infrastructure: A Computational Design Science Approach S Ullman The University of Arizona, 2024 | | 2024 |
Why Following Friends Can Hurt You: A Replication Study BM Ampel, S Ullman AIS Transactions on Replication Research 9 (1), 6, 2023 | | 2023 |