Follow
Jana Shakarian
Jana Shakarian
Assistant Research Technologist, ASU
Verified email at asu.edu - Homepage
Title
Cited by
Cited by
Year
Introduction to cyber-warfare: A multidisciplinary approach
P Shakarian, J Shakarian, A Ruef
Newnes, 2013
1962013
Darknet and deepnet mining for proactive cybersecurity threat intelligence
E Nunes, A Diab, A Gunn, E Marin, V Mishra, V Paliath, J Robertson, ...
2016 IEEE Conference on Intelligence and Security Informatics (ISI), 7-12, 2016
1902016
Darkweb cyber threat intelligence mining
J Robertson, A Diab, E Marin, E Nunes, V Paliath, J Shakarian, ...
Cambridge University Press, 2017
642017
Computational analysis of terrorist groups: Lashkar-e-taiba: Lashkar-e-taiba
VS Subrahmanian, A Mannes, A Sliva, J Shakarian, JP Dickerson
Springer New York, 2013
572013
Proactive identification of exploits in the wild through vulnerability mentions online
M Almukaynizi, E Nunes, K Dharaiya, M Senguttuvan, J Shakarian, ...
2017 International Conference on Cyber Conflict (CyCon US), 82-88, 2017
552017
Exploring malicious hacker forums
J Shakarian, AT Gunn, P Shakarian
Cyber deception, 259-282, 2016
332016
Mining key-hackers on darkweb forums
E Marin, J Shakarian, P Shakarian
2018 1st International Conference on Data Intelligence and Security (ICDIS …, 2018
312018
Predicting enterprise cyber incidents using social network analysis on dark web hacker forums
S Sarkar, M Almukaynizi, J Shakarian, P Shakarian
The Cyber Defense Review, 87-102, 2019
252019
Predicting cyber threats through hacker social networks in darkweb and deepweb forums
M Almukaynizi, A Grimm, E Nunes, J Shakarian, P Shakarian
Proceedings of the 2017 International Conference of The Computational Social …, 2017
212017
Data driven game theoretic cyber threat mitigation
J Robertson, V Paliath, J Shakarian, A Thart, P Shakarian
Twenty-Eighth IAAI Conference, 2016
192016
Patch before exploited: An approach to identify targeted software vulnerabilities
M Almukaynizi, E Nunes, K Dharaiya, M Senguttuvan, J Shakarian, ...
AI in Cybersecurity, 81-113, 2019
182019
Attacking iranian nuclear facilities: Stuxnet
P Shakarian, J Shakarian, A Ruef
Introduction to cyber-warfare: A multidisciplinary approach, 223-239, 2013
182013
A computationally-enabled analysis of Lashkar-e-Taiba attacks in Jammu and Kashmir
A Mannes, J Shakarian, A Sliva, VS Subrahmanian
2011 European Intelligence and Security Informatics Conference, 224-229, 2011
162011
Predicting cyber threats through the dynamics of user connectivity in darkweb and deepweb forums
M Almukaynizi, A Grimm, E Nunes, J Shakarian, P Shakarian
ACM Computational Social Science, 2017
152017
Darknet mining and game theory for enhanced cyber threat intelligence
J Robertson, A Diab, E Marin, E Nunes, V Paliath, J Shakarian, ...
The Cyber Defense Review 1 (2), 95-122, 2016
152016
Predicting hacker adoption on darkweb forums using sequential rule mining
E Marin, M Almukaynizi, E Nunes, J Shakarian, P Shakarian
2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018
132018
Mining user interaction patterns in the darkweb to predict enterprise cyber incidents
S Sarkar, M Almukaynizi, J Shakarian, P Shakarian
Social Network Analysis and Mining 9 (1), 1-28, 2019
112019
Crisis and collective problem solving in dark web: An exploration of a black hat forum
KH Kwon, JH Priniski, S Sarkar, J Shakarian, P Shakarian
Proceedings of the 8th International Conference on Social Media & Society, 1-5, 2017
92017
Black-hat hackers’ crisis information processing in the darknet: A case study of cyber underground market shutdowns
KH Kwon, J Shakarian
Networks, Hacking, and Media–CITA MS@ 30: Now and Then and Tomorrow, 2018
72018
Cyber attacks and public embarrassment: A survey of some notable hacks
J Shakarian, P Shakarian, A Ruef
arXiv preprint arXiv:1501.05990, 2015
72015
The system can't perform the operation now. Try again later.
Articles 1–20