• 511 Citations
  • 12 h-Index
20102019
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the experts' scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 3 Similar Profiles
Logic programming Engineering & Materials Science
Learning systems Engineering & Materials Science
Law enforcement Engineering & Materials Science
Temporal logic Engineering & Materials Science
social network Social Sciences
Graph theory Engineering & Materials Science
Computer networks Engineering & Materials Science
Military operations Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2010 2019

Patch before exploited: An approach to identify targeted software vulnerabilities

Almukaynizi, M., Nunes, E., Dharaiya, K., Senguttuvan, M., Shakarian, J. & Shakarian, P., Jan 1 2019, Intelligent Systems Reference Library. Springer Science and Business Media Deutschland GmbH, p. 81-113 33 p. (Intelligent Systems Reference Library; vol. 151).

Research output: Chapter in Book/Report/Conference proceedingChapter

vulnerability
World Wide Web
Classifiers
software
Vulnerability

Predicting hacker adoption on darkweb forums using sequential rule mining

Marin, E., Almukaynizi, M., Nunes, E., Shakarian, J. & Shakarian, P., Mar 20 2019, Proceedings - 16th IEEE International Symposium on Parallel and Distributed Processing with Applications, 17th IEEE International Conference on Ubiquitous Computing and Communications, 8th IEEE International Conference on Big Data and Cloud Computing, 11th IEEE International Conference on Social Computing and Networking and 8th IEEE International Conference on Sustainable Computing and Communications, ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018. Chen, J. & Yang, L. T. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1183-1190 8 p. 8672225. (Proceedings - 16th IEEE International Symposium on Parallel and Distributed Processing with Applications, 17th IEEE International Conference on Ubiquitous Computing and Communications, 8th IEEE International Conference on Big Data and Cloud Computing, 11th IEEE International Conference on Social Computing and Networking and 8th IEEE International Conference on Sustainable Computing and Communications, ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments

Using network motifs to characterize temporal network evolution leading to diffusion inhibition

Sarkar, S., Guo, R. & Shakarian, P., Dec 1 2019, In : Social Network Analysis and Mining. 9, 1, 14.

Research output: Contribution to journalArticle

social network
Reinforcement
interaction
movies
reinforcement

Applying argumentation models for cyber attribution

Nunes, E., Shakarian, P., Simari, G. I. & Ruef, A., Jan 1 2018, SpringerBriefs in Computer Science. 9783319737874 ed. Springer, p. 75-84 10 p. (SpringerBriefs in Computer Science; no. 9783319737874).

Research output: Chapter in Book/Report/Conference proceedingChapter

Argumentation-based cyber attribution: The DeLP3E model

Nunes, E., Shakarian, P., Simari, G. I. & Ruef, A., Jan 1 2018, SpringerBriefs in Computer Science. 9783319737874 ed. Springer, p. 17-45 29 p. (SpringerBriefs in Computer Science; no. 9783319737874).

Research output: Chapter in Book/Report/Conference proceedingChapter

Logic programming
Statistical Models
Uncertainty

Projects 2015 2019