Darkembed: Exploit prediction with neural language models N Tavabi, P Goyal, M Almukaynizi, P Shakarian, K Lerman Proceedings of the AAAI Conference on Artificial Intelligence 32 (1), 2018 | 84 | 2018 |
Proactive Identification of Exploits in the Wild Through Vulnerability Mentions Online M Almukaynizi, E Nunes, K Dharaiya, M Senguttuvan, J Shakarian, ... 2017 International Conference on Cyber Conflict (CyCon U.S.), 82-88, 2017 | 77 | 2017 |
Predicting cyber threats through hacker social networks in darkweb and deepweb forums M Almukaynizi, A Grimm, E Nunes, J Shakarian, P Shakarian Proceedings of the 2017 International Conference of The Computational Social …, 2017 | 44* | 2017 |
Predicting enterprise cyber incidents using social network analysis on dark web hacker forums S Sarkar, M Almukaynizi, J Shakarian, P Shakarian The Cyber Defense Review, 87-102, 2019 | 32 | 2019 |
Darkmention: A deployed system to predict enterprise-targeted external cyberattacks M Almukaynizi, E Marin, E Nunes, P Shakarian, GI Simari, D Kapoor, ... 2018 IEEE International Conference on Intelligence and Security Informatics …, 2018 | 31 | 2018 |
Patch before exploited: An approach to identify targeted software vulnerabilities M Almukaynizi, E Nunes, K Dharaiya, M Senguttuvan, J Shakarian, ... AI in Cybersecurity, 81-113, 2019 | 24 | 2019 |
Finding cryptocurrency attack indicators using temporal logic and darkweb data M Almukaynizi, V Paliath, M Shah, M Shah, P Shakarian 2018 IEEE International Conference on Intelligence and Security Informatics …, 2018 | 18 | 2018 |
Community finding of malware and exploit vendors on darkweb marketplaces E Marin, M Almukaynizi, E Nunes, P Shakarian 2018 1st International Conference on Data Intelligence and Security (ICDIS …, 2018 | 17 | 2018 |
Mining user interaction patterns in the darkweb to predict enterprise cyber incidents S Sarkar, M Almukaynizi, J Shakarian, P Shakarian Social Network Analysis and Mining 9, 1-28, 2019 | 16 | 2019 |
Systems and methods for predicting the likelihood of cyber-threats leveraging intelligence associated with hacker communities M Almukaynizi, E Marin, P Shakarian, G Simari, E Nunes US Patent App. 16/522,001, 2020 | 14 | 2020 |
Predicting hacker adoption on darkweb forums using sequential rule mining E Marin, M Almukaynizi, E Nunes, J Shakarian, P Shakarian 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018 | 14 | 2018 |
SPIN: a blockchain-based framework for sharing COVID-19 pandemic information across nations Y Alabdulkarim, A Alameer, M Almukaynizi, A Almaslukh Applied Sciences 11 (18), 8767, 2021 | 11 | 2021 |
Reasoning about future cyber-attacks through socio-technical hacking information E Marin, M Almukaynizi, P Shakarian 2019 IEEE 31st International Conference on Tools with Artificial …, 2019 | 7 | 2019 |
Inductive and deductive reasoning to assist in cyber-attack prediction E Marin, M Almukaynizi, P Shakarian 2020 10th Annual Computing and Communication Workshop and Conference (CCWC …, 2020 | 6 | 2020 |
Systems and methods for predicting which software vulnerabilities will be exploited by malicious hackers to prioritize for patching P Shakarian, M Almukaynizi, J Shakarian, E Nunes, K Dharaiya, ... US Patent App. 16/640,878, 2020 | 5 | 2020 |
A logic programming approach to predict enterprise-targeted cyberattacks M Almukaynizi, E Marin, M Shah, E Nunes, GI Simari, P Shakarian Data Science in Cybersecurity and Cyberthreat Intelligence, 13-32, 2020 | 5 | 2020 |
Predicting no-shows for dental appointments Y Alabdulkarim, M Almukaynizi, A Alameer, B Makanati, R Althumairy, ... PeerJ Computer Science 8, e1147, 2022 | 3 | 2022 |
Systems and methods for an at-risk system identification via analysis of online hacker community discussions E Nunes, J Shakarian, P Shakarian, M Almukaynizi, H Singh, G Simari, ... US Patent App. 16/875,540, 2020 | 3 | 2020 |
Systems and methods for identifying hacker communications related to vulnerabilities P Shakarian, J Shakarian, HS Sandhu, M Almukaynizi, M Shah US Patent App. 16/899,485, 2021 | 2 | 2021 |
Systems and methods for a text mining approach for predicting exploitation of vulnerabilities N Tavabi, P Goyal, K Lerman, M Almukaynizi, P Shakarian US Patent 11,520,900, 2022 | 1 | 2022 |