A Logic Programming Approach to Predict Enterprise-Targeted Cyberattacks.
Proceedings of the Data Science in Cybersecurity and Cyberthreat Intelligence, 2020
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.
Proceedings of the 29th USENIX Security Symposium, 2020
Reasoning about Cyber Threat Actors.
PhD thesis, 2018
Predicting Hacker Adoption on Darkweb Forums Using Sequential Rule Mining.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Community Finding of Malware and Exploit Vendors on Darkweb Marketplaces.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
At-risk system identification via analysis of discussions on the darkweb.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018
Measuring cyber attribution in games.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017
Proactive identification of exploits in the wild through vulnerability mentions online.
Proceedings of the 2017 International Conference on Cyber Conflict, 2017
Darknet and deepnet mining for proactive cybersecurity threat intelligence.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
Argumentation models for cyber attribution.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016
Toward Argumentation-Based Cyber Attribution.
Proceedings of the Artificial Intelligence for Cyber Security, 2016
Cyber-Deception and Attribution in Capture-the-Flag Exercises.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016
Cyber-Deception and Attribution in Capture-the-Flag Exercises.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
Malware Task Identification: A Data Driven Approach.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015