Sledovat
Sagar Samtani
Sagar Samtani
Assistant Professor & Arthur M. Weimer Fellow; Director, IU Kelley's Data Science and AI Lab
E-mailová adresa ověřena na: iu.edu - Domovská stránka
Název
Citace
Citace
Rok
Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence
S Samtani, R Chinn, H Chen, JF Nunamaker Jr
Journal of Management Information Systems 34 (4), 1023-1053, 2017
1842017
Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach
R Williams, E McMahon, S Samtani, M Patton, H Chen
2017 IEEE International Conference on Intelligence and Security Informatics …, 2017
1332017
Behavioral Biometrics for Continuous Authentication in the Internet of Things Era: An Artificial Intelligence Perspective
Y Liang, S Samtani, B Guo, Z Yu
IEEE Internet of Things Journal 7 (9), 9128 - 9143, 2020
1232020
Exploring hacker assets in underground forums
S Samtani, R Chinn, H Chen
2015 IEEE international conference on intelligence and security informatics …, 2015
1002015
On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild
MS Pour, A Mangino, K Friday, M Rathbun, E Bou-Harb, F Iqbal, ...
Computers & Security 91, 101707, 2020
812020
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques
S Samtani, S Yu, H Zhu, M Patton, H Chen
2016 IEEE Conference on Intelligence and Security Informatics (ISI), 25-30, 2016
792016
Assessing medical device vulnerabilities on the Internet of Things
E McMahon, R Williams, M El, S Samtani, M Patton, H Chen
2017 IEEE international conference on intelligence and security informatics …, 2017
732017
AZsecure Hacker Assets Portal: Cyber Threat Intelligence and Malware Analysis
S Samtani, K Chinn, C Larson, H Chen
2016 IEEE conference on intelligence and security informatics (ISI), 19-24, 2016
722016
Cybersecurity as an industry: A cyber threat intelligence perspective
S Samtani, M Abate, V Benjamin, W Li
The Palgrave Handbook of International Cybercrime and Cyberdeviance, 135-154, 2020
662020
Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF)
S Samtani, H Zhu, H Chen
ACM Transactions on Privacy and Security 23 (21), 1-33, 2020
602020
Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence
J Grisham, S Samtani, M Patton, H Chen
2017 IEEE international conference on intelligence and security informatics …, 2017
582017
Identifying SCADA systems and their vulnerabilities on the internet of things: A text-mining approach
S Samtani, S Yu, H Zhu, M Patton, J Matherly, H Chen
IEEE Intelligent Systems 33 (2), 63-73, 2018
54*2018
Fusion of heterogeneous attention mechanisms in multi-view convolutional neural network for text classification
Y Liang, H Li, B Guo, Z Yu, X Zheng, S Samtani, DD Zeng
Information Sciences 548, 295-312, 2021
522021
Trailblazing the Artificial Intelligence for Cybersecurity Discipline: A Multi-Disciplinary Research Roadmap
S Samtani, M Kantarcioglu, H Chen
ACM Transactions on Management Information Systems 11 (4), 1-18, 2020
512020
A deep learning approach for recognizing activity of daily living (ADL) for senior care: Exploiting interaction dependency and temporal patterns
H Zhu, S Samtani, R Brown, H Chen
MIS Quarterly 45 (2), 859-896, 2021
482021
AI for Security and Security for AI
E Bertino, M Kantarcioglu, CG Akcora, S Samtani, S Mittal, M Gupta
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
472021
Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-based Deep Structured Semantic Model
S Samtani, Y Chai, H Chen
MIS Quarterly 46 (2), 909-944, 2022
452022
Human Identification for Activities of Daily Living: A Deep Transfer Learning Approach
H Zhu, S Samtani, H Chen, JF Nunamaker Jr
Journal of Management Information Systems 37 (2), 457-483, 2020
452020
Incremental hacker forum exploit collection and classification for proactive cyber threat intelligence: An exploratory study
R Williams, S Samtani, M Patton, H Chen
2018 IEEE International Conference on Intelligence and Security Informatics …, 2018
402018
Using social network analysis to identify key hackers for keylogging tools in hacker forums
S Samtani, H Chen
2016 IEEE conference on intelligence and security informatics (ISI), 319-321, 2016
372016
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20