Jana Shakarian
Jana Shakarian
Assistant Research Technologist, ASU
Verified email at asu.edu - Homepage
Title
Cited by
Cited by
Year
Introduction to cyber-warfare: A multidisciplinary approach
P Shakarian, J Shakarian, A Ruef
Newnes, 2013
1792013
Darknet and deepnet mining for proactive cybersecurity threat intelligence
E Nunes, A Diab, A Gunn, E Marin, V Mishra, V Paliath, J Robertson, ...
2016 IEEE Conference on Intelligence and Security Informatics (ISI), 7-12, 2016
1582016
Darkweb cyber threat intelligence mining
J Robertson, A Diab, E Marin, E Nunes, V Paliath, J Shakarian, ...
Cambridge University Press, 2017
582017
Computational analysis of terrorist groups: Lashkar-e-taiba: Lashkar-e-taiba
VS Subrahmanian, A Mannes, A Sliva, J Shakarian, JP Dickerson
Springer New York, 2013
572013
Proactive identification of exploits in the wild through vulnerability mentions online
M Almukaynizi, E Nunes, K Dharaiya, M Senguttuvan, J Shakarian, ...
2017 International Conference on Cyber Conflict (CyCon US), 82-88, 2017
482017
Exploring malicious hacker forums
J Shakarian, AT Gunn, P Shakarian
Cyber deception, 259-282, 2016
332016
Mining key-hackers on darkweb forums
E Marin, J Shakarian, P Shakarian
2018 1st International Conference on Data Intelligence and Security (ICDIS …, 2018
252018
Data driven game theoretic cyber threat mitigation
J Robertson, V Paliath, J Shakarian, A Thart, P Shakarian
Twenty-Eighth IAAI Conference, 2016
182016
A computationally-enabled analysis of Lashkar-e-Taiba attacks in Jammu and Kashmir
A Mannes, J Shakarian, A Sliva, VS Subrahmanian
2011 European Intelligence and Security Informatics Conference, 224-229, 2011
162011
Patch before exploited: An approach to identify targeted software vulnerabilities
M Almukaynizi, E Nunes, K Dharaiya, M Senguttuvan, J Shakarian, ...
AI in Cybersecurity, 81-113, 2019
152019
Darknet mining and game theory for enhanced cyber threat intelligence
J Robertson, A Diab, E Marin, E Nunes, V Paliath, J Shakarian, ...
The Cyber Defense Review 1 (2), 95-122, 2016
152016
Predicting enterprise cyber incidents using social network analysis on dark web hacker forums
S Sarkar, M Almukaynizi, J Shakarian, P Shakarian
The Cyber Defense Review, 87-102, 2019
142019
Predicting cyber threats through hacker social networks in darkweb and deepweb forums
M Almukaynizi, A Grimm, E Nunes, J Shakarian, P Shakarian
Proceedings of the 2017 International Conference of The Computational Social …, 2017
142017
Attacking iranian nuclear facilities: Stuxnet
P Shakarian, J Shakarian, A Ruef
Introduction to cyber-warfare: A multidisciplinary approach, 223-239, 2013
142013
Predicting cyber threats through the dynamics of user connectivity in darkweb and deepweb forums
M Almukaynizi, A Grimm, E Nunes, J Shakarian, P Shakarian
ACM Computational Social Science, 2017
122017
Mining user interaction patterns in the darkweb to predict enterprise cyber incidents
S Sarkar, M Almukaynizi, J Shakarian, P Shakarian
Social Network Analysis and Mining 9 (1), 1-28, 2019
82019
Predicting hacker adoption on darkweb forums using sequential rule mining
E Marin, M Almukaynizi, E Nunes, J Shakarian, P Shakarian
2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018
82018
Cyber attacks and public embarrassment: A survey of some notable hacks
J Shakarian, P Shakarian, A Ruef
arXiv preprint arXiv:1501.05990, 2015
72015
The Dragon and the Computer: Why Intellectual Property Theft is Compatible with Chinese Cyber-Warfare Doctrine
P Shakarian, J Shakarian, A Ruef
arXiv preprint arXiv:1309.6450, 2013
72013
Cyber attacks by nonstate hacking groups: The case of anonymous and its affiliates
P Shakarian, J Shakarian, A Ruef
Shakarian P., Shakarian J., Ruef A. Introduction to Cyber-Warfare Syngress …, 2013
72013
The system can't perform the operation now. Try again later.
Articles 1–20