Search Results for author: Paulo Shakarian

Found 15 papers, 0 papers with code

An End-to-End Framework to Identify Pathogenic Social Media Accounts on Twitter

no code implementations4 May 2019 Elham Shaabani, Ashkan Sadeghi-Mobarakeh, Hamidreza Alvari, Paulo Shakarian

Pathogenic Social Media (PSM) accounts such as terrorist supporter accounts and fake news writers have the capability of spreading disinformation to viral proportions.

Causal Inference

DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks

no code implementations30 Oct 2018 Mohammed Almukaynizi, Ericsson Marin, Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Dipsy Kapoor, Timothy Siedlecki

In particular, we show that it outperforms baseline systems that attempt to generate warnings of cyber attacks related to two enterprises with an average increase in F1 score of about 45% and 57%.

Early Identification of Pathogenic Social Media Accounts

no code implementations25 Sep 2018 Hamidreza Alvari, Elham Shaabani, Paulo Shakarian

Pathogenic Social Media (PSM) accounts such as terrorist supporters exploit large communities of supporters for conducting attacks on social media.

Causal Inference Community Detection

Causal Inference for Early Detection of Pathogenic Social Media Accounts

no code implementations26 Jun 2018 Hamidreza Alvari, Paulo Shakarian

Pathogenic social media accounts such as terrorist supporters exploit communities of supporters for conducting attacks on social media.

Causal Inference Community Detection +1

Strongly Hierarchical Factorization Machines and ANOVA Kernel Regression

no code implementations25 Dec 2017 Ruocheng Guo, Hamidreza Alvari, Paulo Shakarian

High-order parametric models that include terms for feature interactions are applied to various data mining tasks, where ground truth depends on interactions of features.

Sparse Learning

Semi-Supervised Learning for Detecting Human Trafficking

no code implementations30 May 2017 Hamidreza Alvari, Paulo Shakarian, J. E. Kelly Snyder

Human trafficking is one of the most atrocious crimes and among the challenging problems facing law enforcement which demands attention of global magnitude.

A Non-Parametric Learning Approach to Identify Online Human Trafficking

no code implementations29 Jul 2016 Hamidreza Alvari, Paulo Shakarian, J. E. Kelly Snyder

Human trafficking is among the most challenging law enforcement problems which demands persistent fight against from all over the globe.

MIST: Missing Person Intelligence Synthesis Toolkit

no code implementations28 Jul 2016 Elham Shaabani, Hamidreza Alvari, Paulo Shakarian, J. E. Kelly Snyder

Each day, approximately 500 missing persons cases occur that go unsolved/unresolved in the United States.

Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence

no code implementations28 Jul 2016 Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin, Vineet Mishra, Vivin Paliath, John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian

We have developed an operational system for obtaining information from these sites for the purposes of identifying emerging cyber threats.

Product Offerings in Malicious Hacker Markets

no code implementations26 Jul 2016 Ericsson Marin, Ahmad Diab, Paulo Shakarian

Marketplaces specializing in malicious hacking products - including malware and exploits - have recently become more prominent on the darkweb and deepweb.

Argumentation Models for Cyber Attribution

no code implementations7 Jul 2016 Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Andrew Ruef

A major challenge in cyber-threat analysis is combining information from different sources to find the person or the group responsible for the cyber-attack.

Mining for Causal Relationships: A Data-Driven Study of the Islamic State

no code implementations5 Aug 2015 Andrew Stanton, Amanda Thart, Ashish Jain, Priyank Vyas, Arpan Chatterjee, Paulo Shakarian

The Islamic State of Iraq and al-Sham (ISIS) is a dominant insurgent group operating in Iraq and Syria that rose to prominence when it took over Mosul in June, 2014.

An Argumentation-Based Framework to Address the Attribution Problem in Cyber-Warfare

no code implementations27 Apr 2014 Paulo Shakarian, Gerardo I. Simari, Geoffrey Moores, Simon Parsons, Marcelo A. Falappa

Attributing a cyber-operation through the use of multiple pieces of technical evidence (i. e., malware reverse-engineering and source tracking) and conventional intelligence sources (i. e., human or signals intelligence) is a difficult problem not only due to the effort required to obtain evidence, but the ease with which an adversary can plant false evidence.

Belief Revision in Structured Probabilistic Argumentation

no code implementations7 Jan 2014 Paulo Shakarian, Gerardo I. Simari, Marcelo A. Falappa

In real-world applications, knowledge bases consisting of all the information at hand for a specific domain, along with the current state of affairs, are bound to contain contradictory data coming from different sources, as well as data with varying degrees of uncertainty attached.

Cannot find the paper you are looking for? You can Submit a new open access paper.