Cloudy with a chance of breach: Forecasting cyber security incidents Y Liu, A Sarabi, J Zhang, P Naghizadeh, M Karir, M Bailey, M Liu 24th USENIX Security Symposium (USENIX Security 15), 1009-1024, 2015 | 255 | 2015 |
Risky business: Fine-grained data breach prediction using business profiles A Sarabi, P Naghizadeh, Y Liu, M Liu Journal of Cybersecurity 2 (1), 15-28, 2016 | 58 | 2016 |
Predicting cyber security incidents using feature-based characterization of network-level malicious activities Y Liu, J Zhang, A Sarabi, M Liu, M Karir, M Bailey Proceedings of the 2015 ACM International Workshop on International Workshop …, 2015 | 53 | 2015 |
From patching delays to infection symptoms: Using risk profiles for an early discovery of vulnerabilities exploited in the wild C Xiao, A Sarabi, Y Liu, B Li, M Liu, T Dumitras 27th USENIX Security Symposium (USENIX Security 18), 903-918, 2018 | 38 | 2018 |
Patch me if you can: A study on the effects of individual user behavior on the end-host vulnerability state A Sarabi, Z Zhu, C Xiao, M Liu, T Dumitraş Passive and Active Measurement: 18th International Conference, PAM 2017 …, 2017 | 37 | 2017 |
Characterizing the internet host population using deep learning: A universal and lightweight numerical embedding A Sarabi, M Liu Proceedings of the Internet Measurement Conference 2018, 133-146, 2018 | 24 | 2018 |
Enhancing Vulnerability prioritization: Data-driven exploit predictions with community-driven insights J Jacobs, S Romanosky, O Suciu, B Edwards, A Sarabi 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2023 | 19 | 2023 |
Prioritizing Security Spending: A Quantitative Analysis of Risk Distributions for Different Business Profiles. A Sarabi, P Naghizadeh, Y Liu, M Liu WEIS, 2015 | 19 | 2015 |
An llm-based framework for fingerprinting internet-connected devices A Sarabi, T Yin, M Liu Proceedings of the 2023 ACM on Internet Measurement Conference, 478-484, 2023 | 13 | 2023 |
Deterrence, backup, or insurance: A game-theoretic analysis of ransomware T Yin, A Sarabi, M Liu The Annual Workshop on the Economics of Information Security (WEIS), 2021 | 10 | 2021 |
Smart internet probing: Scanning using adaptive machine learning A Sarabi, K Jin, M Liu Game Theory and Machine Learning for Cyber Security, 411-437, 2021 | 6 | 2021 |
Deterrence, backup, or insurance: game-theoretic modeling of ransomware T Yin, A Sarabi, M Liu Games 14 (2), 20, 2023 | 5 | 2023 |
Can less be more? A game-theoretic analysis of filtering vs. investment A Sarabi, P Naghizadeh, M Liu Decision and Game Theory for Security: 5th International Conference, GameSec …, 2014 | 3 | 2014 |
Quantifying Security: Methods, Challenges and Applications A Sarabi | 2 | 2018 |
Analyzing Corporate Privacy Policies using AI Chatbots Z Huang, J Tang, M Karir, M Liu, A Sarabi Proceedings of the 2024 ACM on Internet Measurement Conference, 505-515, 2024 | | 2024 |
Adaptive network probing using machine learning A Sarabi, M Liu, JIN Kun, YIN Tongxin US Patent App. 18/033,834, 2023 | | 2023 |
Quantitative Cybersecurity: Breach Prediction and Incentive Design M Liu, Y Liu, A Sarabi, P Naghizadeh, M Bailey, M Karir | | |
Forecasting Cybersecurity Incidents and Its Role in Designing Incentive Mechanisms M Liu, Y Liu, A Sarabi, P Naghizadeh, M Bailey | | |