Alert button
Picture for Ehsan Aghaei

Ehsan Aghaei

Alert button

Automated CVE Analysis for Threat Prioritization and Impact Prediction

Add code
Bookmark button
Alert button
Sep 06, 2023
Ehsan Aghaei, Ehab Al-Shaer, Waseem Shadid, Xi Niu

Figure 1 for Automated CVE Analysis for Threat Prioritization and Impact Prediction
Figure 2 for Automated CVE Analysis for Threat Prioritization and Impact Prediction
Figure 3 for Automated CVE Analysis for Threat Prioritization and Impact Prediction
Figure 4 for Automated CVE Analysis for Threat Prioritization and Impact Prediction
Viaarxiv icon

CVE-driven Attack Technique Prediction with Semantic Information Extraction and a Domain-specific Language Model

Add code
Bookmark button
Alert button
Sep 06, 2023
Ehsan Aghaei, Ehab Al-Shaer

Figure 1 for CVE-driven Attack Technique Prediction with Semantic Information Extraction and a Domain-specific Language Model
Figure 2 for CVE-driven Attack Technique Prediction with Semantic Information Extraction and a Domain-specific Language Model
Figure 3 for CVE-driven Attack Technique Prediction with Semantic Information Extraction and a Domain-specific Language Model
Figure 4 for CVE-driven Attack Technique Prediction with Semantic Information Extraction and a Domain-specific Language Model
Viaarxiv icon

Language Model for Text Analytic in Cybersecurity

Add code
Bookmark button
Alert button
Apr 06, 2022
Ehsan Aghaei, Xi Niu, Waseem Shadid, Ehab Al-Shaer

Figure 1 for Language Model for Text Analytic in Cybersecurity
Figure 2 for Language Model for Text Analytic in Cybersecurity
Figure 3 for Language Model for Text Analytic in Cybersecurity
Figure 4 for Language Model for Text Analytic in Cybersecurity
Viaarxiv icon

ThreatZoom: CVE2CWE using Hierarchical Neural Network

Add code
Bookmark button
Alert button
Sep 24, 2020
Ehsan Aghaei, Waseem Shadid, Ehab Al-Shaer

Figure 1 for ThreatZoom: CVE2CWE using Hierarchical Neural Network
Figure 2 for ThreatZoom: CVE2CWE using Hierarchical Neural Network
Figure 3 for ThreatZoom: CVE2CWE using Hierarchical Neural Network
Figure 4 for ThreatZoom: CVE2CWE using Hierarchical Neural Network
Viaarxiv icon

The Panacea Threat Intelligence and Active Defense Platform

Add code
Bookmark button
Alert button
Apr 20, 2020
Adam Dalton, Ehsan Aghaei, Ehab Al-Shaer, Archna Bhatia, Esteban Castillo, Zhuo Cheng, Sreekar Dhaduvai, Qi Duan, Md Mazharul Islam, Younes Karimi, Amir Masoumzadeh, Brodie Mather, Sashank Santhanam, Samira Shaikh, Tomek Strzalkowski, Bonnie J. Dorr

Figure 1 for The Panacea Threat Intelligence and Active Defense Platform
Figure 2 for The Panacea Threat Intelligence and Active Defense Platform
Viaarxiv icon

Host-based anomaly detection using Eigentraces feature extraction and one-class classification on system call trace data

Add code
Bookmark button
Alert button
Nov 25, 2019
Ehsan Aghaei, Gursel Serpen

Figure 1 for Host-based anomaly detection using Eigentraces feature extraction and one-class classification on system call trace data
Figure 2 for Host-based anomaly detection using Eigentraces feature extraction and one-class classification on system call trace data
Figure 3 for Host-based anomaly detection using Eigentraces feature extraction and one-class classification on system call trace data
Figure 4 for Host-based anomaly detection using Eigentraces feature extraction and one-class classification on system call trace data
Viaarxiv icon