Paulo Shakarian
Paulo Shakarian
Verified email at - Homepage
Cited by
Cited by
Darknet and deepnet mining for proactive cybersecurity threat intelligence
E Nunes, A Diab, A Gunn, E Marin, V Mishra, V Paliath, J Robertson, ...
2016 IEEE Conference on Intelligence and Security Informatics (ISI), 7-12, 2016
Introduction to cyber-warfare: A multidisciplinary approach
P Shakarian, J Shakarian, A Ruef
Elsevier/Syngress, 2013
A review of evolutionary graph theory with applications to game theory
P Shakarian, P Roos, A Johnson
Biosystems 107 (2), 66-80, 2012
Early warnings of cyber threats in online discussions
A Sapienza, A Bessi, S Damodaran, P Shakarian, K Lerman, E Ferrara
2017 IEEE International Conference on Data Mining Workshops (ICDMW), 667-674, 2017
Darkembed: Exploit prediction with neural language models
N Tavabi, P Goyal, M Almukaynizi, P Shakarian, K Lerman
Proceedings of the AAAI Conference on Artificial Intelligence 32 (1), 2018
Proactive identification of exploits in the wild through vulnerability mentions online
M Almukaynizi, E Nunes, K Dharaiya, M Senguttuvan, J Shakarian, ...
2017 International Conference on Cyber Conflict (CyCon US), 82-88, 2017
The independent cascade and linear threshold models
P Shakarian, A Bhatnagar, A Aleali, E Shaabani, R Guo, P Shakarian, ...
Diffusion in Social Networks, 35-48, 2015
Darkweb cyber threat intelligence mining
J Robertson, A Diab, E Marin, E Nunes, V Paliath, J Shakarian, ...
Cambridge University Press, 2017
The 2008 Russian cyber campaign against Georgia
P Shakarian
Military Review-English Edition 91 (6), 63, 2011
Semi-supervised learning for detecting human trafficking
H Alvari, P Shakarian, JEK Snyder
Security Informatics 6, 1-14, 2017
Diffusion in social networks
P Shakarian, A Bhatnagar, A Aleali, E Shaabani, R Guo
Springer International Publishing, 2015
A non-parametric learning approach to identify online human trafficking
H Alvari, P Shakarian, JEK Snyder
2016 IEEE Conference on Intelligence and Security Informatics (ISI), 133-138, 2016
A scalable heuristic for viral marketing under the tipping model
P Shakarian, S Eyre, D Paulo
Social Network Analysis and Mining 3, 1225-1248, 2013
Stuxnet: Cyberwar revolution in military affairs
P Shakarian
Small Wars Journal, 2011
Product offerings in malicious hacker markets
E Marin, A Diab, P Shakarian
2016 IEEE conference on intelligence and security informatics (ISI), 187-189, 2016
Large social networks can be targeted for viral marketing with small seed sets
P Shakarian, D Paulo
2012 IEEE/ACM International Conference on Advances in Social Networks …, 2012
Annotated probabilistic temporal logic
P Shakarian, A Parker, G Simari, VS Subrahmanian
ACM Transactions on Computational Logic (TOCL) 12 (2), 14, 2011
A scalable framework for modeling competitive diffusion in social networks
M Broecheler, P Shakarian, VS Subrahmanian
2010 IEEE Second International Conference on Social Computing, 295-302, 2010
Mining key-hackers on darkweb forums
E Marin, J Shakarian, P Shakarian
2018 1st International Conference on Data Intelligence and Security (ICDIS …, 2018
An independent evaluation of ChatGPT on mathematical word problems (MWP)
P Shakarian, A Koyyalamudi, N Ngu, L Mareedu
arXiv preprint arXiv:2302.13814, 2023
The system can't perform the operation now. Try again later.
Articles 1–20