Search Results - "Shakarian, Paulo"

Refine Results
  1. 1

    Dark-Web Cyber Threat Intelligence: From Data to Intelligence to Prediction by Shakarian, Paulo

    Published in Information (Basel) (01-12-2018)
    “…Scientific work that leverages information about communities on the deep and dark web has opened up new angles in the field of security informatics. [...]…”
    Get full text
    Journal Article
  2. 2

    Use of a controlled experiment and computational models to measure the impact of sequential peer exposures on decision making by Sarkar, Soumajyoti, Shakarian, Paulo, Sanchez, Danielle, Armenta, Mika, Lakkaraju, Kiran, Xin, Baogui

    Published in PloS one (09-07-2020)
    “…It is widely believed that one's peers influence product adoption behaviors. This relationship has been linked to the number of signals a decision-maker…”
    Get full text
    Journal Article
  3. 3

    Finding near-optimal groups of epidemic spreaders in a complex network by Moores, Geoffrey, Shakarian, Paulo, Macdonald, Brian, Howard, Nicholas

    Published in PloS one (01-04-2014)
    “…In this paper, we present algorithms to find near-optimal sets of epidemic spreaders in complex networks. We extend the notion of local-centrality, a…”
    Get full text
    Journal Article
  4. 4

    Introduction to Cyber-Warfare by Andrew Ruef, Jana Shakarian, Paulo Shakarian

    Published 16-05-2013
    “…Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare…”
    Get full text
    eBook
  5. 5

    Argumentation-Based Query Answering under Uncertainty with Application to Cybersecurity by Leiva, Mario A., García, Alejandro J., Shakarian, Paulo, Simari, Gerardo I.

    Published in Big data and cognitive computing (01-09-2022)
    “…Decision support tools are key components of intelligent sociotechnical systems, and their successful implementation faces a variety of challenges, including…”
    Get full text
    Journal Article
  6. 6

    Similar pathogen targets in Arabidopsis thaliana and homo sapiens protein networks by Shakarian, Paulo, Wickiser, J Kenneth

    Published in PloS one (21-09-2012)
    “…We study the behavior of pathogens on host protein networks for humans and Arabidopsis - noting striking similarities. Specifically, we preform [Formula: see…”
    Get full text
    Journal Article
  7. 7

    Early Warnings of Cyber Threats in Online Discussions by Sapienza, Anna, Bessi, Alessandro, Damodaran, Saranya, Shakarian, Paulo, Lerman, Kristina, Ferrara, Emilio

    “…We introduce a system for automatically generating warnings of imminent or current cyber-threats. Our system leverages the communication of malicious actors on…”
    Get full text
    Conference Proceeding
  8. 8

    A review of evolutionary graph theory with applications to game theory by Shakarian, Paulo, Roos, Patrick, Johnson, Anthony

    Published in BioSystems (01-02-2012)
    “…Evolutionary graph theory (EGT), studies the ability of a mutant gene to overtake a finite structured population. In this review, we describe the original…”
    Get full text
    Journal Article
  9. 9

    Introduction to Cyber-Warfare: A Multidisciplinary Approach by Shakarian, Paulo, Shakarian, Jana, Ruef, Andrew

    Published 2013
    “…Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare…”
    Get full text
    eBook
  10. 10

    Using network motifs to characterize temporal network evolution leading to diffusion inhibition by Sarkar, Soumajyoti, Guo, Ruocheng, Shakarian, Paulo

    Published in Social network analysis and mining (01-12-2019)
    “…Network motifs are patterns of over-represented node interactions in a network which have been previously used as building blocks to understand various aspects…”
    Get full text
    Journal Article
  11. 11

    A scalable heuristic for viral marketing under the tipping model by Shakarian, Paulo, Eyre, Sean, Paulo, Damon

    Published in Social network analysis and mining (01-12-2013)
    “…In a “tipping” model, each node in a social network, representing an individual, adopts a property or behavior if a certain number of his incoming neighbors…”
    Get full text
    Journal Article
  12. 12

    Mining user interaction patterns in the darkweb to predict enterprise cyber incidents by Sarkar, Soumajyoti, Almukaynizi, Mohammad, Shakarian, Jana, Shakarian, Paulo

    Published in Social network analysis and mining (01-12-2019)
    “…With the rise in security breaches over the past few years, there has been an increasing need to mine insights from social media platforms to raise alerts of…”
    Get full text
    Journal Article
  13. 13

    A novel analytical method for evolutionary graph theory problems by Shakarian, Paulo, Roos, Patrick, Moores, Geoffrey

    Published in BioSystems (01-02-2013)
    “…Evolutionary graph theory studies the evolutionary dynamics of populations structured on graphs. A central problem is determining the probability that a small…”
    Get full text
    Journal Article
  14. 14

    Understanding and forecasting lifecycle events in information cascades by Sarkar, Soumajyoti, Guo, Ruocheng, Shakarian, Paulo

    Published in Social network analysis and mining (01-12-2017)
    “…Most social network sites allow users to reshare a piece of information posted by a user. As time progresses, the cascade of reshares grows, eventually…”
    Get full text
    Journal Article
  15. 15

    Exploring geographic hotspots using topological data analysis by Zhang, Rui, Lukasczyk, Jonas, Wang, Feng, Ebert, David, Shakarian, Paulo, Mack, Elizabeth A., Maciejewski, Ross

    Published in Transactions in GIS (01-12-2021)
    “…This article describes a scalar field topology (SFT)‐based methodology for the interactive characterization and analysis of hotspots for density fields defined…”
    Get full text
    Journal Article
  16. 16

    Belief revision in structured probabilistic argumentation: Model and application to cyber security by Shakarian, Paulo, Simari, Gerardo I., Moores, Geoffrey, Paulo, Damon, Parsons, Simon, Falappa, Marcelo A., Aleali, Ashkan

    “…In real-world applications, knowledge bases consisting of all the available information for a specific domain, along with the current state of affairs, will…”
    Get full text
    Journal Article
  17. 17
  18. 18

    Toward early and order-of-magnitude cascade prediction in social networks by Guo, Ruocheng, Shaabani, Elham, Bhatnagar, Abhinav, Shakarian, Paulo

    Published in Social network analysis and mining (01-12-2016)
    “…When a piece of information (microblog, photograph, video, link, etc.) starts to spread in a social network, an important question arises: will it spread to…”
    Get full text
    Journal Article
  19. 19

    A quantitative approach to belief revision in structured probabilistic argumentation by Simari, Gerardo I., Shakarian, Paulo, Falappa, Marcelo A.

    “…Many real-world knowledge-based systems must deal with information coming from different sources that invariably leads to incompleteness, overspecification, or…”
    Get full text
    Journal Article
  20. 20

    Hawkes Process for Understanding the Influence of Pathogenic Social Media Accounts by Alvari, Hamidreza, Shakarian, Paulo

    “…Over the past years, political events and public opinion on the Web have been allegedly manipulated by accounts dedicated to spreading disinformation and…”
    Get full text
    Conference Proceeding