| Cloudy with a chance of breach: Forecasting cyber security incidents Y Liu, A Sarabi, J Zhang, P Naghizadeh, M Karir, M Bailey, M Liu 24th USENIX security symposium (USENIX Security 15), 1009-1024, 2015 | 283 | 2015 |
| Risky business: Fine-grained data breach prediction using business profiles A Sarabi, P Naghizadeh, Y Liu, M Liu Journal of Cybersecurity 2 (1), 15-28, 2016 | 67 | 2016 |
| Enhancing vulnerability prioritization: Data-driven exploit predictions with community-driven insights J Jacobs, S Romanosky, O Suciu, B Edwards, A Sarabi 2023 IEEE European symposium on security and privacy workshops (euroS&pW …, 2023 | 64 | 2023 |
| Predicting cyber security incidents using feature-based characterization of network-level malicious activities Y Liu, J Zhang, A Sarabi, M Liu, M Karir, M Bailey Proceedings of the 2015 ACM International Workshop on International Workshop …, 2015 | 59 | 2015 |
| From patching delays to infection symptoms: Using risk profiles for an early discovery of vulnerabilities exploited in the wild C Xiao, A Sarabi, Y Liu, B Li, M Liu, T Dumitras 27th USENIX Security Symposium (USENIX Security 18), 903-918, 2018 | 48 | 2018 |
| Patch me if you can: A study on the effects of individual user behavior on the end-host vulnerability state A Sarabi, Z Zhu, C Xiao, M Liu, T Dumitraş International Conference on Passive and Active Network Measurement, 113-125, 2017 | 37 | 2017 |
| An llm-based framework for fingerprinting internet-connected devices A Sarabi, T Yin, M Liu Proceedings of the 2023 ACM on Internet Measurement Conference, 478-484, 2023 | 33 | 2023 |
| Characterizing the internet host population using deep learning: A universal and lightweight numerical embedding A Sarabi, M Liu Proceedings of the Internet Measurement Conference 2018, 133-146, 2018 | 30 | 2018 |
| Prioritizing Security Spending: A Quantitative Analysis of Risk Distributions for Different Business Profiles. A Sarabi, P Naghizadeh, Y Liu, M Liu WEIS, 2015 | 21 | 2015 |
| Deterrence, backup, or insurance: game-theoretic modeling of ransomware T Yin, A Sarabi, M Liu Games 14 (2), 20, 2023 | 18 | 2023 |
| Deterrence, backup, or insurance: a game-theoretic analysis of ransomware T Yin, A Sarabi, M Liu The Annual Workshop on the Economics of Information Security (WEIS), 2021 | 11 | 2021 |
| Smart internet probing: Scanning using adaptive machine learning A Sarabi, K Jin, M Liu Game Theory and Machine Learning for Cyber Security, 411-437, 2021 | 7 | 2021 |
| Context flexibly modulates cue representations in visual cortex AD Faulkner, AS Chiu, A Sarabi, S Karthik, YS Li, CR Burgess Nature Communications 16 (1), 5516, 2025 | 3 | 2025 |
| Can less be more? A game-theoretic analysis of filtering vs. investment A Sarabi, P Naghizadeh, M Liu International Conference on Decision and Game Theory for Security, 329-339, 2014 | 3 | 2014 |
| Analyzing Corporate Privacy Policies using AI Chatbots Z Huang, J Tang, M Karir, M Liu, A Sarabi Proceedings of the 2024 ACM on Internet Measurement Conference, 505-515, 2024 | 2 | 2024 |
| Quantifying Security: Methods, Challenges and Applications A Sarabi | 2 | 2018 |
| Scoring the Unscorables: Cyber Risk Assessment Beyond Internet Scans A Sarabi, M Karir, M Liu arXiv preprint arXiv:2506.06604, 2025 | | 2025 |
| The Ransomware Decade: The Creation of a {Fine-Grained} Dataset and a Longitudinal Study A Sarabi, Z Huang, C Wang, T Karir, M Liu 34th USENIX Security Symposium (USENIX Security 25), 4799-4818, 2025 | | 2025 |
| Adaptive network probing using machine learning A SARABI, M Liu US Patent 12,107,749, 2024 | | 2024 |
| Quantitative Cybersecurity: Breach Prediction and Incentive Design M Liu, Y Liu, A Sarabi, P Naghizadeh, M Bailey, M Karir | | |