[go: up one dir, main page]

Follow
Ghaith Husari
Title
Cited by
Cited by
Year
TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources
G Husari, E Al-Shaer, M Ahmed, B Chu, X Niu
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
3522017
Using NLP for cybersecurity. Extracting Cyber Attack Behaviors from Text
G Husari, E Al-Shaer, M Ahmed, B Chu, X Niu
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
352*2017
IoTSAT: A formal framework for security analysis of the internet of things (IoT)
M Mohsin, Z Anwar, G Husari, E Al-Shaer, MA Rahman
2016 IEEE conference on communications and network security (CNS), 180-188, 2016
1152016
Using entropy and mutual information to extract threat actions from cyber threat intelligence
G Husari, X Niu, B Chu, E Al-Shaer
2018 IEEE international conference on intelligence and security informatics …, 2018
912018
Agile approaches for cybersecurity systems, IoT and intelligent transportation
YM Tashtoush, DA Darweesh, G Husari, OA Darwish, Y Darwish, LB Issa, ...
IEEE Access 10, 1360-1375, 2021
642021
Machine learning approach for brain tumor detection
M Al-Ayyoub, G Husari, O Darwish, A Alabed-alaziz
Proceedings of the 3rd international conference on information and …, 2012
582012
Thor: A deep learning approach for face mask detection to prevent the COVID-19 pandemic
SE Snyder, G Husari
SoutheastCon 2021, 1-8, 2021
492021
SnapCatch: automatic detection of covert timing channels using image processing and machine learning
S Al-Eidi, O Darwish, Y Chen, G Husari
IEEE Access 9, 177-191, 2020
422020
Symptoms-based fuzzy-logic approach for COVID-19 diagnosis
M Shatnawi, A Shatnawi, Z AlShara, G Husari
International Journal of Advanced Computer Science and Applications 12 (4 …, 2021
402021
Learning APT Chains from Cyber Threat Intelligence
G Husari, E Al-Shaer, B Chu, RF Rahman
2019 Hot Topics in Science and Security (HotSoS 2019), 2019
402019
Roi-driven cyber risk mitigation using host compliance and network configuration
MN Alsaleh, E Al-Shaer, G Husari
Journal of Network and Systems Management 25 (4), 759-783, 2017
162017
Machine learning algorithms and their applications in classifying cyber-attacks on a smart grid network
A Aribisala, MS Khan, G Husari
2021 IEEE 12th Annual Information Technology, Electronics and Mobile …, 2021
152021
Machine learning predictive analytics for player movement prediction in NBA: applications, opportunities, and challenges
DK Stephanos, G Husari, BT Bennett, E Stephanos
Proceedings of the 2021 ACM Southeast Conference, 2-8, 2021
152021
Feed-forward intrusion detection and classification on a smart grid network
A Aribisala, MS Khan, G Husari
2022 IEEE 12th Annual Computing and Communication Workshop and Conference …, 2022
132022
Improving Vertical Handoffs Using Mobility Prediction
M Al-Ayyoub, G Husari, W Mardini
International Journal of Advanced Computer Science and Applications(IJACSA …, 2016
132016
Optimizing the RoI of cyber risk mitigation
MN Alsaleh, G Husari, E Al-Shaer
2016 12th International Conference on Network and Service Management (CNSM …, 2016
102016
Towards improving channel switching in cognitive radio networks
E Kanan, G Husari, M Al-Ayyoub, Y Jararweh
2015 6th International Conference on Information and Communication Systems …, 2015
82015
Convolutional neural network structure to detect and localize ctc using image processing
S Al-Eidi, O Darwish, G Husari, Y Chen, M Elkhodr
2022 IEEE International IOT, Electronics and Mechatronics Conference …, 2022
72022
SENA: preserving social structure for network embedding
S Hong, T Chakraborty, S Ahn, G Husari, N Park
Proceedings of the 28th ACM Conference on hypertext and social media, 235-244, 2017
72017
A data-driven password strength meter for cybersecurity assessment and enhancement
MM Algharibeh, G Husari, S Jaf
2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th …, 2021
32021
The system can't perform the operation now. Try again later.
Articles 1–20