Ghaith Husari
Cited by
Cited by
TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources
G Husari, E Al-Shaer, M Ahmed, B Chu, X Niu
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
Using NLP for cybersecurity. Extracting Cyber Attack Behaviors from Text
G Husari, E Al-Shaer, M Ahmed, B Chu, X Niu
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
IoTSAT: A formal framework for security analysis of the internet of things (IoT)
M Mohsin, Z Anwar, G Husari, E Al-Shaer, MA Rahman
2016 IEEE conference on communications and network security (CNS), 180-188, 2016
Using entropy and mutual information to extract threat actions from cyber threat intelligence
G Husari, X Niu, B Chu, E Al-Shaer
2018 IEEE international conference on intelligence and security informatics …, 2018
Machine learning approach for brain tumor detection
M Al-Ayyoub, G Husari, O Darwish, A Alabed-alaziz
Proceedings of the 3rd international conference on information and …, 2012
Thor: A deep learning approach for face mask detection to prevent the COVID-19 pandemic
SE Snyder, G Husari
SoutheastCon 2021, 1-8, 2021
Learning APT Chains from Cyber Threat Intelligence
G Husari, E Al-Shaer, B Chu, RF Rahman
2019 Hot Topics in Science and Security (HotSoS 2019), 2019
Agile approaches for cybersecurity systems, IoT and intelligent transportation
YM Tashtoush, DA Darweesh, G Husari, OA Darwish, Y Darwish, LB Issa, ...
IEEE Access 10, 1360-1375, 2021
SnapCatch: automatic detection of covert timing channels using image processing and machine learning
S Al-Eidi, O Darwish, Y Chen, G Husari
IEEE Access 9, 177-191, 2020
Symptoms-based fuzzy-logic approach for COVID-19 diagnosis
M Shatnawi, A Shatnawi, Z AlShara, G Husari
Int J Adv Comp Sci Appl 12 (4), 2021
Roi-driven cyber risk mitigation using host compliance and network configuration
MN Alsaleh, E Al-Shaer, G Husari
Journal of Network and Systems Management 25, 759-783, 2017
Improving Vertical Handoffs Using Mobility Prediction
M Al-Ayyoub, G Husari, W Mardini
International Journal of Advanced Computer Science and Applications(IJACSA …, 2016
Towards improving channel switching in cognitive radio networks
E Kanan, G Husari, M Al-Ayyoub, Y Jararweh
2015 6th International Conference on Information and Communication Systems …, 2015
Optimizing the roi of cyber risk mitigation
MN Alsaleh, G Husari, E Al-Shaer
2016 12th International Conference on Network and Service Management (CNSM …, 2016
Machine learning predictive analytics for player movement prediction in NBA: applications, opportunities, and challenges
DK Stephanos, G Husari, BT Bennett, E Stephanos
Proceedings of the 2021 ACM Southeast Conference, 2-8, 2021
SENA: preserving social structure for network embedding
S Hong, T Chakraborty, S Ahn, G Husari, N Park
Proceedings of the 28th ACM Conference on hypertext and social media, 235-244, 2017
Machine Learning Algorithms And Their Applications In Classifying Cyber-Attacks On A Smart Grid Network
A Aribisala, MS Khan, G Husari
2021 IEEE 12th Annual Information Technology, Electronics and Mobile …, 2021
Convolutional Neural Network Structure to Detect and Localize CTC Using Image Processing
S Al-Eidi, O Darwish, G Husari, Y Chen, M Elkhodr
2022 IEEE International IOT, Electronics and Mechatronics Conference …, 2022
Feed-Forward Intrusion Detection and Classification on a Smart Grid Network
A Aribisala, MS Khan, G Husari
2022 IEEE 12th Annual Computing and Communication Workshop and Conference …, 2022
A Data-Driven Password Strength Meter for Cybersecurity Assessment and Enhancement
MM Algharibeh, G Husari, S Jaf
2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th …, 2021
The system can't perform the operation now. Try again later.
Articles 1–20