Author of the publication

Mining user interaction patterns in the darkweb to predict enterprise cyber incidents.

, , , and . Soc. Netw. Anal. Min., 9 (1): 57:1-57:28 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Argumentation-Based Query Answering under Uncertainty with Application to Cybersecurity., , , and . Big Data Cogn. Comput., 6 (3): 91 (2022)Hawkes Process for Understanding the Influence of Pathogenic Social Media Accounts., and . ICDIS, page 36-42. IEEE, (2019)A Neuro-symbolic Approach to Argument Comparison in Structured Argumentation., , , , , and . AI³@AI*IA, volume 3546 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)Cyber Threat Analysis with Structured Probabilistic Argumentation., , , and . AI³@AI*IA, volume 2528 of CEUR Workshop Proceedings, page 50-64. CEUR-WS.org, (2019)Dark-Web Cyber Threat Intelligence: From Data to Intelligence to Prediction.. Information, 9 (12): 305 (2018)Leveraging Motifs to Model the Temporal Dynamics of Diffusion Networks., , and . WWW (Companion Volume), page 1079-1086. ACM, (2019)Finding Novel Event Relationships in Temporal Data., , and . ICDIS, page 9-16. IEEE, (2018)Reasoning about Complex Networks: A Logic Programming Approach., , and . CoRR, (2022)Community Finding of Malware and Exploit Vendors on Darkweb Marketplaces., , , and . ICDIS, page 81-84. IEEE, (2018)Predicting Hacker Adoption on Darkweb Forums Using Sequential Rule Mining., , , , and . ISPA/IUCC/BDCloud/SocialCom/SustainCom, page 1183-1190. IEEE, (2018)