Proactive identification of exploits in the wild through vulnerability mentions online M Almukaynizi, E Nunes, K Dharaiya, M Senguttuvan, J Shakarian, ... 2017 International Conference on Cyber Conflict (CyCon US), 82-88, 2017 | 84 | 2017 |
Patch before exploited: An approach to identify targeted software vulnerabilities M Almukaynizi, E Nunes, K Dharaiya, M Senguttuvan, J Shakarian, ... AI in Cybersecurity, 81-113, 2019 | 24 | 2019 |
Systems and methods for predicting which software vulnerabilities will be exploited by malicious hackers to prioritize for patching P Shakarian, M Almukaynizi, J Shakarian, E Nunes, K Dharaiya, ... US Patent 11,892,897, 2024 | 9 | 2024 |
Systems and methods for predicting which software vulnerabilities will be exploited by malicious hackers to prioritize for patching P Shakarian, M Almukaynizi, J Shakarian, E Nunes, K Dharaiya, ... US Patent App. 18/496,880, 2024 | | 2024 |
Systems and methods for third party risk assessment E Nunes, K Dharaiya, J Shakarian, P Shakarian US Patent 11,336,673, 2022 | | 2022 |
Identifying Financial Frauds on Darkweb KT Dharaiya Arizona State University, 2018 | | 2018 |