Shakarian, Jana
36  results:
Search for persons X
?
1

Automated Corpus Annotation for Cybersecurity Named Entity ..:

, In: Lecture Notes in Networks and Systems; Intelligent Systems and Applications,
 
?
2

Social Structure Construction from the Forums Using Interac..:

, In: Advances in Intelligent Systems and Computing; Proceedings of the Future Technologies Conference (FTC) 2020, Volume 3,
 
?
3

Human-Machine Interaction for Improved Cybersecurity Named ..:

, In: Advances in Intelligent Systems and Computing; Intelligent Systems and Applications,
 
?
6

Patch Before Exploited: An Approach to Identify Targeted So..:

, In: AI in Cybersecurity; Intelligent Systems Reference Library,
 
?
8

Crisis and Collective Problem Solving in Dark Web : An E..:

, In: Proceedings of the 8th International Conference on Social Media & Society,
 
?
9

Predicting Cyber Threats through Hacker Social Networks in ..:

, In: Proceedings of the 2017 International Conference of The Computational Social Science Society of the Americas,
 
?
11

When Who Tells the Best Story Wins:

, In: Introduction to Cyber-Warfare,
 
?
 
?
15

Cyber Attacks by Nonstate Hacking Groups:

, In: Introduction to Cyber-Warfare,
 
1-15