Volgen
Sagar Samtani
Sagar Samtani
Assistant Professor & Arthur M. Weimer Fellow; Director, IU Kelley's Data Science and AI Lab
Geverifieerd e-mailadres voor iu.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence
S Samtani, R Chinn, H Chen, JF Nunamaker Jr
Journal of Management Information Systems 34 (4), 1023-1053, 2017
1852017
Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach
R Williams, E McMahon, S Samtani, M Patton, H Chen
2017 IEEE International Conference on Intelligence and Security Informatics …, 2017
1362017
Behavioral Biometrics for Continuous Authentication in the Internet of Things Era: An Artificial Intelligence Perspective
Y Liang, S Samtani, B Guo, Z Yu
IEEE Internet of Things Journal 7 (9), 9128 - 9143, 2020
1282020
Exploring hacker assets in underground forums
S Samtani, R Chinn, H Chen
2015 IEEE international conference on intelligence and security informatics …, 2015
1002015
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques
S Samtani, S Yu, H Zhu, M Patton, H Chen
2016 IEEE Conference on Intelligence and Security Informatics (ISI), 25-30, 2016
812016
On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild
MS Pour, A Mangino, K Friday, M Rathbun, E Bou-Harb, F Iqbal, ...
Computers & Security 91, 101707, 2020
802020
Assessing medical device vulnerabilities on the Internet of Things
E McMahon, R Williams, M El, S Samtani, M Patton, H Chen
2017 IEEE international conference on intelligence and security informatics …, 2017
752017
AZsecure Hacker Assets Portal: Cyber Threat Intelligence and Malware Analysis
S Samtani, K Chinn, C Larson, H Chen
2016 IEEE conference on intelligence and security informatics (ISI), 19-24, 2016
722016
Cybersecurity as an industry: A cyber threat intelligence perspective
S Samtani, M Abate, V Benjamin, W Li
The Palgrave Handbook of International Cybercrime and Cyberdeviance, 135-154, 2020
682020
Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF)
S Samtani, H Zhu, H Chen
ACM Transactions on Privacy and Security 23 (21), 1-33, 2020
612020
Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence
J Grisham, S Samtani, M Patton, H Chen
2017 IEEE international conference on intelligence and security informatics …, 2017
582017
Identifying SCADA systems and their vulnerabilities on the internet of things: A text-mining approach
S Samtani, S Yu, H Zhu, M Patton, J Matherly, H Chen
IEEE Intelligent Systems 33 (2), 63-73, 2018
56*2018
Fusion of heterogeneous attention mechanisms in multi-view convolutional neural network for text classification
Y Liang, H Li, B Guo, Z Yu, X Zheng, S Samtani, DD Zeng
Information Sciences 548, 295-312, 2021
552021
Trailblazing the Artificial Intelligence for Cybersecurity Discipline: A Multi-Disciplinary Research Roadmap
S Samtani, M Kantarcioglu, H Chen
ACM Transactions on Management Information Systems 11 (4), 1-18, 2020
542020
A deep learning approach for recognizing activity of daily living (ADL) for senior care: Exploiting interaction dependency and temporal patterns
H Zhu, S Samtani, R Brown, H Chen
MIS Quarterly 45 (2), 859-896, 2021
492021
AI for Security and Security for AI
E Bertino, M Kantarcioglu, CG Akcora, S Samtani, S Mittal, M Gupta
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
472021
Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-based Deep Structured Semantic Model
S Samtani, Y Chai, H Chen
MIS Quarterly 46 (2), 909-944, 2022
462022
Human Identification for Activities of Daily Living: A Deep Transfer Learning Approach
H Zhu, S Samtani, H Chen, JF Nunamaker Jr
Journal of Management Information Systems 37 (2), 457-483, 2020
452020
Incremental hacker forum exploit collection and classification for proactive cyber threat intelligence: An exploratory study
R Williams, S Samtani, M Patton, H Chen
2018 IEEE International Conference on Intelligence and Security Informatics …, 2018
402018
Using social network analysis to identify key hackers for keylogging tools in hacker forums
S Samtani, H Chen
2016 IEEE conference on intelligence and security informatics (ISI), 319-321, 2016
372016
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20