TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources G Husari, E Al-Shaer, M Ahmed, B Chu, X Niu Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 231 | 2017 |
Using NLP for cybersecurity. Extracting Cyber Attack Behaviors from Text G Husari, E Al-Shaer, M Ahmed, B Chu, X Niu Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 231* | 2017 |
IoTSAT: A formal framework for security analysis of the internet of things (IoT) M Mohsin, Z Anwar, G Husari, E Al-Shaer, MA Rahman 2016 IEEE conference on communications and network security (CNS), 180-188, 2016 | 103 | 2016 |
Using entropy and mutual information to extract threat actions from cyber threat intelligence G Husari, X Niu, B Chu, E Al-Shaer 2018 IEEE international conference on intelligence and security informatics …, 2018 | 74 | 2018 |
Machine learning approach for brain tumor detection M Al-Ayyoub, G Husari, O Darwish, A Alabed-alaziz Proceedings of the 3rd international conference on information and …, 2012 | 53 | 2012 |
Thor: A deep learning approach for face mask detection to prevent the COVID-19 pandemic SE Snyder, G Husari SoutheastCon 2021, 1-8, 2021 | 44 | 2021 |
Agile approaches for cybersecurity systems, IoT and intelligent transportation YM Tashtoush, DA Darweesh, G Husari, OA Darwish, Y Darwish, LB Issa, ... IEEE Access 10, 1360-1375, 2021 | 38 | 2021 |
Learning APT Chains from Cyber Threat Intelligence G Husari, E Al-Shaer, B Chu, RF Rahman 2019 Hot Topics in Science and Security (HotSoS 2019), 2019 | 32 | 2019 |
Symptoms-based fuzzy-logic approach for COVID-19 diagnosis M Shatnawi, A Shatnawi, Z AlShara, G Husari International Journal of Advanced Computer Science and Applications 12 (4 …, 2021 | 29 | 2021 |
SnapCatch: automatic detection of covert timing channels using image processing and machine learning S Al-Eidi, O Darwish, Y Chen, G Husari IEEE Access 9, 177-191, 2020 | 26 | 2020 |
Machine learning algorithms and their applications in classifying cyber-attacks on a smart grid network A Aribisala, MS Khan, G Husari 2021 IEEE 12th Annual Information Technology, Electronics and Mobile …, 2021 | 12 | 2021 |
Roi-driven cyber risk mitigation using host compliance and network configuration MN Alsaleh, E Al-Shaer, G Husari Journal of Network and Systems Management 25, 759-783, 2017 | 12 | 2017 |
Improving Vertical Handoffs Using Mobility Prediction M Al-Ayyoub, G Husari, W Mardini International Journal of Advanced Computer Science and Applications(IJACSA …, 2016 | 11 | 2016 |
Machine learning predictive analytics for player movement prediction in NBA: applications, opportunities, and challenges DK Stephanos, G Husari, BT Bennett, E Stephanos Proceedings of the 2021 ACM Southeast Conference, 2-8, 2021 | 9 | 2021 |
SENA: preserving social structure for network embedding S Hong, T Chakraborty, S Ahn, G Husari, N Park Proceedings of the 28th ACM Conference on hypertext and social media, 235-244, 2017 | 7 | 2017 |
Towards improving channel switching in cognitive radio networks E Kanan, G Husari, M Al-Ayyoub, Y Jararweh 2015 6th International Conference on Information and Communication Systems …, 2015 | 7 | 2015 |
Optimizing the roi of cyber risk mitigation MN Alsaleh, G Husari, E Al-Shaer 2016 12th International Conference on Network and Service Management (CNSM …, 2016 | 6 | 2016 |
Convolutional neural network structure to detect and localize ctc using image processing S Al-Eidi, O Darwish, G Husari, Y Chen, M Elkhodr 2022 IEEE International IOT, Electronics and Mechatronics Conference …, 2022 | 4 | 2022 |
Feed-Forward Intrusion Detection and Classification on a Smart Grid Network A Aribisala, MS Khan, G Husari 2022 IEEE 12th Annual Computing and Communication Workshop and Conference …, 2022 | 4 | 2022 |
A Data-Driven Password Strength Meter for Cybersecurity Assessment and Enhancement MM Algharibeh, G Husari, S Jaf 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th …, 2021 | 1 | 2021 |