no code implementations • 6 Sep 2023 • Ehsan Aghaei, Ehab Al-Shaer, Waseem Shadid, Xi Niu
Unfortunately, this manual analysis presents a major bottleneck in the vulnerability analysis process, leading to slowdowns in proactive cybersecurity efforts and the potential for inaccuracies due to human errors.
no code implementations • 6 Sep 2023 • Ehsan Aghaei, Ehab Al-Shaer
This automated correlation facilitates the creation of labeled data, essential for categorizing novel threat actions into threat functionality classes and TTPs.
1 code implementation • 6 Apr 2022 • Ehsan Aghaei, Xi Niu, Waseem Shadid, Ehab Al-Shaer
Natural Language Processing (NLP) has recently gained wide attention in cybersecurity, particularly in Cyber Threat Intelligence (CTI) and cyber automation.
no code implementations • 19 Apr 2021 • Ashutosh Dutta, Ehab Al-Shaer, Samrat Chatterjee
With the increasing system complexity and attack sophistication, the necessity of autonomous cyber defense becomes vivid for cyber and cyber-physical systems (CPSs).
1 code implementation • 23 Feb 2021 • Siddhartha Shankar Das, Edoardo Serra, Mahantesh Halappanavar, Alex Pothen, Ehab Al-Shaer
Weaknesses in computer systems such as faults, bugs and errors in the architecture, design or implementation of software provide vulnerabilities that can be exploited by attackers to compromise the security of a system.
Ranked #1 on General Classification on CVE to CWE mapping
no code implementations • 24 Sep 2020 • Ehsan Aghaei, Waseem Shadid, Ehab Al-Shaer
The Common Vulnerabilities and Exposures (CVE) represent standard means for sharing publicly known information security vulnerabilities.
no code implementations • LREC 2020 • Adam Dalton, Ehsan Aghaei, Ehab Al-Shaer, Archna Bhatia, Esteban Castillo, Zhuo Cheng, Sreekar Dhaduvai, Qi Duan, Bryanna Hebenstreit, Md Mazharul Islam, Younes Karimi, Amir Masoumzadeh, Brodie Mather, Sashank Santhanam, Samira Shaikh, Alan Zemel, Tomek Strzalkowski, Bonnie J. Dorr
We describe a system that supports natural language processing (NLP) components for active defenses against social engineering attacks.
no code implementations • 20 Apr 2020 • Adam Dalton, Ehsan Aghaei, Ehab Al-Shaer, Archna Bhatia, Esteban Castillo, Zhuo Cheng, Sreekar Dhaduvai, Qi Duan, Md Mazharul Islam, Younes Karimi, Amir Masoumzadeh, Brodie Mather, Sashank Santhanam, Samira Shaikh, Tomek Strzalkowski, Bonnie J. Dorr
We describe Panacea, a system that supports natural language processing (NLP) components for active defenses against social engineering attacks.