Paulo Shakarian
Orcid: 0000-0002-3159-4660
According to our database1,
Paulo Shakarian
authored at least 114 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Geospatial Trajectory Generation via Efficient Abduction: Deployment for Independent Testing.
CoRR, 2024
Diversity Measures: Domain-Independent Proxies for Failure in Language Model Queries.
Proceedings of the 18th IEEE International Conference on Semantic Computing, 2024
Proceedings of the 18th IEEE International Conference on Semantic Computing, 2024
Proceedings of the Neural-Symbolic Learning and Reasoning - 18th International Conference, 2024
Error Detection and Constraint Recovery in Hierarchical Multi-Label Classification without Prior Knowledge.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
2023
Springer Briefs in Computer Science, Springer, ISBN: 978-3-031-39178-1, 2023
Rule-Based Error Detection and Correction to Operationalize Movement Trajectory Classification.
CoRR, 2023
Proceedings of the 7th Workshop on Advances in Argumentation in Artificial Intelligence (AI^3 2023) co-located with the 22nd International Conference of the Italian Association for Artificial Intelligence (AIxIA 2023), 2023
Proceedings of the AAAI 2023 Spring Symposium on Challenges Requiring the Combination of Machine Learning and Knowledge Engineering (AAAI-MAKE 2023), 2023
Proceedings of the AAAI 2023 Spring Symposium on Challenges Requiring the Combination of Machine Learning and Knowledge Engineering (AAAI-MAKE 2023), 2023
2022
Argumentation-Based Query Answering under Uncertainty with Application to Cybersecurity.
Big Data Cogn. Comput., 2022
Proceedings of the Fourth International Conference on Transdisciplinary AI, 2022
2021
Identification of Pathogenic Social Media Accounts - From Data to Intelligence to Prediction
Springer Briefs in Computer Science, Springer, ISBN: 978-3-030-61430-0, 2021
2020
Proceedings of the Data Science in Cybersecurity and Cyberthreat Intelligence, 2020
ACM Trans. Soc. Comput., 2020
Proceedings of the 3rd International Conference on Data Intelligence and Security, 2020
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020
2019
Using network motifs to characterize temporal network evolution leading to diffusion inhibition.
Soc. Netw. Anal. Min., 2019
Mining user interaction patterns in the darkweb to predict enterprise cyber incidents.
Soc. Netw. Anal. Min., 2019
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019
Less is More: Semi-Supervised Causal Inference for Detecting Pathogenic Users in Social Media.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019
Can social influence be exploited to compromise security: an online experimental evaluation.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019
Impact of social influence on adoption behavior: an online controlled experimental evaluation.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019
Proceedings of the 3rd Workshop on Advances In Argumentation In Artificial Intelligence co-located with the 18th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2019), 2019
2018
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
Inf., 2018
Proceedings of the 2018 SIAM International Conference on Data Mining, 2018
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018
Predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums.
Proceedings of the 2018 International Conference on Cyber Conflict, 2018
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018
2017
Soc. Netw. Anal. Min., 2017
Crisis and Collective Problem Solving in Dark Web: An Exploration of a Black Hat Forum.
Proceedings of the 8th International Conference on Social Media & Society, 2017
Proceedings of the Social, Cultural, and Behavioral Modeling, 2017
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017
Proactive identification of exploits in the wild through vulnerability mentions online.
Proceedings of the 2017 International Conference on Cyber Conflict, 2017
2016
Soc. Netw. Anal. Min., 2016
A quantitative approach to belief revision in structured probabilistic argumentation.
Ann. Math. Artif. Intell., 2016
Belief revision in structured probabilistic argumentation - Model and application to cyber security.
Ann. Math. Artif. Intell., 2016
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016
Proceedings of the Artificial Intelligence for Cyber Security, 2016
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
Proceedings of the Artificial Intelligence for Cyber Security, 2016
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016
2015
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-23105-1, 2015
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015
IEEE Intell. Informatics Bull., 2015
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
2014
An Argumentation-Based Framework to Address the Attribution Problem in Cyber-Warfare.
CoRR, 2014
Proceedings of the Social Informatics - SocInfo 2014 International Workshops, Barcelona, 2014
Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions.
Proceedings of the SECRYPT 2014, 2014
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014
Keeping Intruders at Bay: A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014
Proceedings of the Foundations of Information and Knowledge Systems, 2014
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014
2013
Theory Pract. Log. Program., 2013
Using Generalized Annotated Programs to Solve Social Network Diffusion Optimization Problems.
ACM Trans. Comput. Log., 2013
Soc. Netw. Anal. Min., 2013
The Dragon and the Computer: Why Intellectual Property Theft is Compatible with Chinese Cyber-Warfare Doctrine.
CoRR, 2013
Proceedings of the 2nd IEEE Network Science Workshop, 2013
Mining for geographically disperse communities in social networks by leveraging distance modularity.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
Proceedings of the 2013 AAAI Fall Symposia, Arlington, Virginia, USA, November 15-17, 2013, 2013
2012
ACM Trans. Comput. Log., 2012
Biosyst., 2012
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012
2011
Proceedings of the Counterterrorism and Open Source Intelligence, 2011
Towards Shrink-Wrapped Security: Practically Incorporating Context Into Security Services.
Proceedings of the 2nd International Conference on Ambient Systems, 2011
Abductive Inference for Combat: Using SCARE-S2 to Find High-Value Targets in Afghanistan.
Proceedings of the Twenty-Third Conference on Innovative Applications of Artificial Intelligence, 2011
2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the Technical Communications of the 26th International Conference on Logic Programming, 2010