| Smet: Semantic mapping of cve to att&ck and its application to cybersecurity B Abdeen, E Al-Shaer, A Singhal, L Khan, K Hamlen IFIP Annual Conference on Data and Applications Security and Privacy, 243-260, 2023 | 52 | 2023 |
| Soda: A system for cyber deception orchestration and automation MSI Sajid, J Wei, B Abdeen, E Al-Shaer, MM Islam, W Diong, L Khan Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 47 | 2021 |
| SymbSODA: configurable and verifiable orchestration automation for active malware deception MSI Sajid, J Wei, E Al-Shaer, Q Duan, B Abdeen, L Khan ACM Transactions on Privacy and Security 26 (4), 1-36, 2023 | 12 | 2023 |
| The design of an ontology for ATT&CK and its application to cybersecurity KA Akbar, SM Halim, A Singhal, B Abdeen, L Khan, B Thuraisingham Proceedings of the Thirteenth ACM Conference on Data and Application …, 2023 | 11 | 2023 |
| SMET: Semantic mapping of CTI reports and CVE to ATT&CK for advanced threat intelligence B Abdeen, E Al-Shaer, A Singhal, L Khan, KW Hamlen Journal of Computer Security, JCS-230218, 2024 | 2 | 2024 |
| VeriActor: Dynamic Generation of Challenge-Response Questions for Enhanced Email Sender Verification B Abdeen, E Al-Shaer, W Shadid 2023 IEEE Conference on Communications and Network Security (CNS), 1-9, 2023 | 2 | 2023 |
| Hallucination Detection in Large Language Models Using Diversion Decoding B Abdeen, SMT Siddiqui, MT Ahmed, A Singhal, L Khan, PP Modi, ... IFIP Annual Conference on Data and Applications Security and Privacy, 116-133, 2025 | | 2025 |
| Classification, Synthesis, and Deception of Attack Tactics, Techniques, and Procedures Using Large Language Models B Abdeen The University of Texas at Dallas, 2025 | | 2025 |