[go: up one dir, main page]

Follow
Armin Sarabi
Armin Sarabi
Assistant Research Scientist, University of Michigan
Verified email at umich.edu - Homepage
Title
Cited by
Cited by
Year
Cloudy with a chance of breach: Forecasting cyber security incidents
Y Liu, A Sarabi, J Zhang, P Naghizadeh, M Karir, M Bailey, M Liu
24th USENIX security symposium (USENIX Security 15), 1009-1024, 2015
2832015
Risky business: Fine-grained data breach prediction using business profiles
A Sarabi, P Naghizadeh, Y Liu, M Liu
Journal of Cybersecurity 2 (1), 15-28, 2016
672016
Enhancing vulnerability prioritization: Data-driven exploit predictions with community-driven insights
J Jacobs, S Romanosky, O Suciu, B Edwards, A Sarabi
2023 IEEE European symposium on security and privacy workshops (euroS&pW …, 2023
642023
Predicting cyber security incidents using feature-based characterization of network-level malicious activities
Y Liu, J Zhang, A Sarabi, M Liu, M Karir, M Bailey
Proceedings of the 2015 ACM International Workshop on International Workshop …, 2015
592015
From patching delays to infection symptoms: Using risk profiles for an early discovery of vulnerabilities exploited in the wild
C Xiao, A Sarabi, Y Liu, B Li, M Liu, T Dumitras
27th USENIX Security Symposium (USENIX Security 18), 903-918, 2018
482018
Patch me if you can: A study on the effects of individual user behavior on the end-host vulnerability state
A Sarabi, Z Zhu, C Xiao, M Liu, T Dumitraş
International Conference on Passive and Active Network Measurement, 113-125, 2017
372017
An llm-based framework for fingerprinting internet-connected devices
A Sarabi, T Yin, M Liu
Proceedings of the 2023 ACM on Internet Measurement Conference, 478-484, 2023
332023
Characterizing the internet host population using deep learning: A universal and lightweight numerical embedding
A Sarabi, M Liu
Proceedings of the Internet Measurement Conference 2018, 133-146, 2018
302018
Prioritizing Security Spending: A Quantitative Analysis of Risk Distributions for Different Business Profiles.
A Sarabi, P Naghizadeh, Y Liu, M Liu
WEIS, 2015
212015
Deterrence, backup, or insurance: game-theoretic modeling of ransomware
T Yin, A Sarabi, M Liu
Games 14 (2), 20, 2023
182023
Deterrence, backup, or insurance: a game-theoretic analysis of ransomware
T Yin, A Sarabi, M Liu
The Annual Workshop on the Economics of Information Security (WEIS), 2021
112021
Smart internet probing: Scanning using adaptive machine learning
A Sarabi, K Jin, M Liu
Game Theory and Machine Learning for Cyber Security, 411-437, 2021
72021
Context flexibly modulates cue representations in visual cortex
AD Faulkner, AS Chiu, A Sarabi, S Karthik, YS Li, CR Burgess
Nature Communications 16 (1), 5516, 2025
32025
Can less be more? A game-theoretic analysis of filtering vs. investment
A Sarabi, P Naghizadeh, M Liu
International Conference on Decision and Game Theory for Security, 329-339, 2014
32014
Analyzing Corporate Privacy Policies using AI Chatbots
Z Huang, J Tang, M Karir, M Liu, A Sarabi
Proceedings of the 2024 ACM on Internet Measurement Conference, 505-515, 2024
22024
Quantifying Security: Methods, Challenges and Applications
A Sarabi
22018
Scoring the Unscorables: Cyber Risk Assessment Beyond Internet Scans
A Sarabi, M Karir, M Liu
arXiv preprint arXiv:2506.06604, 2025
2025
The Ransomware Decade: The Creation of a {Fine-Grained} Dataset and a Longitudinal Study
A Sarabi, Z Huang, C Wang, T Karir, M Liu
34th USENIX Security Symposium (USENIX Security 25), 4799-4818, 2025
2025
Adaptive network probing using machine learning
A SARABI, M Liu
US Patent 12,107,749, 2024
2024
Quantitative Cybersecurity: Breach Prediction and Incentive Design
M Liu, Y Liu, A Sarabi, P Naghizadeh, M Bailey, M Karir
The system can't perform the operation now. Try again later.
Articles 1–20