Alert button
Picture for Ehab Al-Shaer

Ehab Al-Shaer

Alert button

Automated CVE Analysis for Threat Prioritization and Impact Prediction

Add code
Bookmark button
Alert button
Sep 06, 2023
Ehsan Aghaei, Ehab Al-Shaer, Waseem Shadid, Xi Niu

Figure 1 for Automated CVE Analysis for Threat Prioritization and Impact Prediction
Figure 2 for Automated CVE Analysis for Threat Prioritization and Impact Prediction
Figure 3 for Automated CVE Analysis for Threat Prioritization and Impact Prediction
Figure 4 for Automated CVE Analysis for Threat Prioritization and Impact Prediction
Viaarxiv icon

CVE-driven Attack Technique Prediction with Semantic Information Extraction and a Domain-specific Language Model

Add code
Bookmark button
Alert button
Sep 06, 2023
Ehsan Aghaei, Ehab Al-Shaer

Figure 1 for CVE-driven Attack Technique Prediction with Semantic Information Extraction and a Domain-specific Language Model
Figure 2 for CVE-driven Attack Technique Prediction with Semantic Information Extraction and a Domain-specific Language Model
Figure 3 for CVE-driven Attack Technique Prediction with Semantic Information Extraction and a Domain-specific Language Model
Figure 4 for CVE-driven Attack Technique Prediction with Semantic Information Extraction and a Domain-specific Language Model
Viaarxiv icon

Language Model for Text Analytic in Cybersecurity

Add code
Bookmark button
Alert button
Apr 06, 2022
Ehsan Aghaei, Xi Niu, Waseem Shadid, Ehab Al-Shaer

Figure 1 for Language Model for Text Analytic in Cybersecurity
Figure 2 for Language Model for Text Analytic in Cybersecurity
Figure 3 for Language Model for Text Analytic in Cybersecurity
Figure 4 for Language Model for Text Analytic in Cybersecurity
Viaarxiv icon

Constraints Satisfiability Driven Reinforcement Learning for Autonomous Cyber Defense

Add code
Bookmark button
Alert button
Apr 19, 2021
Ashutosh Dutta, Ehab Al-Shaer, Samrat Chatterjee

Figure 1 for Constraints Satisfiability Driven Reinforcement Learning for Autonomous Cyber Defense
Figure 2 for Constraints Satisfiability Driven Reinforcement Learning for Autonomous Cyber Defense
Figure 3 for Constraints Satisfiability Driven Reinforcement Learning for Autonomous Cyber Defense
Figure 4 for Constraints Satisfiability Driven Reinforcement Learning for Autonomous Cyber Defense
Viaarxiv icon

V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities

Add code
Bookmark button
Alert button
Feb 23, 2021
Siddhartha Shankar Das, Edoardo Serra, Mahantesh Halappanavar, Alex Pothen, Ehab Al-Shaer

Figure 1 for V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities
Figure 2 for V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities
Figure 3 for V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities
Figure 4 for V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities
Viaarxiv icon

ThreatZoom: CVE2CWE using Hierarchical Neural Network

Add code
Bookmark button
Alert button
Sep 24, 2020
Ehsan Aghaei, Waseem Shadid, Ehab Al-Shaer

Figure 1 for ThreatZoom: CVE2CWE using Hierarchical Neural Network
Figure 2 for ThreatZoom: CVE2CWE using Hierarchical Neural Network
Figure 3 for ThreatZoom: CVE2CWE using Hierarchical Neural Network
Figure 4 for ThreatZoom: CVE2CWE using Hierarchical Neural Network
Viaarxiv icon

The Panacea Threat Intelligence and Active Defense Platform

Add code
Bookmark button
Alert button
Apr 20, 2020
Adam Dalton, Ehsan Aghaei, Ehab Al-Shaer, Archna Bhatia, Esteban Castillo, Zhuo Cheng, Sreekar Dhaduvai, Qi Duan, Md Mazharul Islam, Younes Karimi, Amir Masoumzadeh, Brodie Mather, Sashank Santhanam, Samira Shaikh, Tomek Strzalkowski, Bonnie J. Dorr

Figure 1 for The Panacea Threat Intelligence and Active Defense Platform
Figure 2 for The Panacea Threat Intelligence and Active Defense Platform
Viaarxiv icon