Search Results - "Shakarian, Paulo"
-
1
Dark-Web Cyber Threat Intelligence: From Data to Intelligence to Prediction
Published in Information (Basel) (01-12-2018)“…Scientific work that leverages information about communities on the deep and dark web has opened up new angles in the field of security informatics. [...]…”
Get full text
Journal Article -
2
Use of a controlled experiment and computational models to measure the impact of sequential peer exposures on decision making
Published in PloS one (09-07-2020)“…It is widely believed that one's peers influence product adoption behaviors. This relationship has been linked to the number of signals a decision-maker…”
Get full text
Journal Article -
3
Finding near-optimal groups of epidemic spreaders in a complex network
Published in PloS one (01-04-2014)“…In this paper, we present algorithms to find near-optimal sets of epidemic spreaders in complex networks. We extend the notion of local-centrality, a…”
Get full text
Journal Article -
4
Introduction to Cyber-Warfare
Published 16-05-2013“…Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare…”
Get full text
eBook -
5
Argumentation-Based Query Answering under Uncertainty with Application to Cybersecurity
Published in Big data and cognitive computing (01-09-2022)“…Decision support tools are key components of intelligent sociotechnical systems, and their successful implementation faces a variety of challenges, including…”
Get full text
Journal Article -
6
Similar pathogen targets in Arabidopsis thaliana and homo sapiens protein networks
Published in PloS one (21-09-2012)“…We study the behavior of pathogens on host protein networks for humans and Arabidopsis - noting striking similarities. Specifically, we preform [Formula: see…”
Get full text
Journal Article -
7
Early Warnings of Cyber Threats in Online Discussions
Published in 2017 IEEE International Conference on Data Mining Workshops (ICDMW) (01-11-2017)“…We introduce a system for automatically generating warnings of imminent or current cyber-threats. Our system leverages the communication of malicious actors on…”
Get full text
Conference Proceeding -
8
A review of evolutionary graph theory with applications to game theory
Published in BioSystems (01-02-2012)“…Evolutionary graph theory (EGT), studies the ability of a mutant gene to overtake a finite structured population. In this review, we describe the original…”
Get full text
Journal Article -
9
Introduction to Cyber-Warfare: A Multidisciplinary Approach
Published 2013“…Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare…”
Get full text
eBook -
10
Using network motifs to characterize temporal network evolution leading to diffusion inhibition
Published in Social network analysis and mining (01-12-2019)“…Network motifs are patterns of over-represented node interactions in a network which have been previously used as building blocks to understand various aspects…”
Get full text
Journal Article -
11
A scalable heuristic for viral marketing under the tipping model
Published in Social network analysis and mining (01-12-2013)“…In a “tipping” model, each node in a social network, representing an individual, adopts a property or behavior if a certain number of his incoming neighbors…”
Get full text
Journal Article -
12
Mining user interaction patterns in the darkweb to predict enterprise cyber incidents
Published in Social network analysis and mining (01-12-2019)“…With the rise in security breaches over the past few years, there has been an increasing need to mine insights from social media platforms to raise alerts of…”
Get full text
Journal Article -
13
A novel analytical method for evolutionary graph theory problems
Published in BioSystems (01-02-2013)“…Evolutionary graph theory studies the evolutionary dynamics of populations structured on graphs. A central problem is determining the probability that a small…”
Get full text
Journal Article -
14
Understanding and forecasting lifecycle events in information cascades
Published in Social network analysis and mining (01-12-2017)“…Most social network sites allow users to reshare a piece of information posted by a user. As time progresses, the cascade of reshares grows, eventually…”
Get full text
Journal Article -
15
Exploring geographic hotspots using topological data analysis
Published in Transactions in GIS (01-12-2021)“…This article describes a scalar field topology (SFT)‐based methodology for the interactive characterization and analysis of hotspots for density fields defined…”
Get full text
Journal Article -
16
Belief revision in structured probabilistic argumentation: Model and application to cyber security
Published in Annals of mathematics and artificial intelligence (01-12-2016)“…In real-world applications, knowledge bases consisting of all the available information for a specific domain, along with the current state of affairs, will…”
Get full text
Journal Article -
17
Proceedings 37th International Conference on Logic Programming (Technical Communications): Probabilistic Defeasible Logic Programming: Towards Explainable and Tractable Query Answering (Extended Abstract)
Published in Electronic proceedings in theoretical computer science (17-09-2021)Get full text
Journal Article -
18
Toward early and order-of-magnitude cascade prediction in social networks
Published in Social network analysis and mining (01-12-2016)“…When a piece of information (microblog, photograph, video, link, etc.) starts to spread in a social network, an important question arises: will it spread to…”
Get full text
Journal Article -
19
A quantitative approach to belief revision in structured probabilistic argumentation
Published in Annals of mathematics and artificial intelligence (01-04-2016)“…Many real-world knowledge-based systems must deal with information coming from different sources that invariably leads to incompleteness, overspecification, or…”
Get full text
Journal Article -
20
Hawkes Process for Understanding the Influence of Pathogenic Social Media Accounts
Published in 2019 2nd International Conference on Data Intelligence and Security (ICDIS) (01-06-2019)“…Over the past years, political events and public opinion on the Web have been allegedly manipulated by accounts dedicated to spreading disinformation and…”
Get full text
Conference Proceeding