Patents/License

  • Systems and Methods for Third Party Risk Assessment
    Eric Nunes, Krishna Dharaiya, Jana Shakarian, Paulo Shakarian
    Provisional: 62/668,871

  • Systems and Methods for predicting which software vulnerabilities will be exploited by malicious hackers to prioritize for Patching
    Eric Nunes, Mohammed Almukaynizi, Krishna Dharaiya, Jana Shakarian, Paulo Shakarian,
    Manoj Balasubramaniam Senguttuvan, Alexander Grimm
    Provisional: 62/581,123

  • Systems and Methods for Data Driven Malware Task Identification
    Eric Nunes, Casey Buto, Paulo Shakarian Christian Lebiere, Stefano Bennati, Robert Thomson
    Patent: 20,160,371,490

  • Intelligent darkweb crawling infrastructure for cyber threat intelligence collection
    Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin, Vineet Mishra, Vivin Paliath,
    John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian
    Licensed by CYR3CON
    Provisional: 62/409,291

Books

  • Artificial Intelligence Tools for Cyber Attribution
    Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Andrew Ruef
    Springer, 2018.
    Link

  • Darkweb Cyber Threat Intelligence Mining
    John Robertson, Ahmad Diab, Ericsson Marin, Eric Nunes, Vivin Paliath, Jana Shakarian, Paulo Shakarian
    Cambridge University Press, 2017.
    Link

Book Chapters

  • Cyber-Deception and Attribution in Capture-the-Flag Exercises (Extended version)
    Eric Nunes, Nimish Kulkarni, Paulo Shakarian, Andrew Ruef, Jay Little
    Cyber Deception: Building the Scientific Foundation
    Editors: S. Jajodia, V.S. Subrahmanian, V. Swarup, C. Wang
    Springer, 2016.
    Link

Refereed Papers

  • At-Risk System Identification via Analysis of Discussions on the Darkweb
    Eric Nunes, Paulo Shakarian, Gerardo I. Simari
    IEEE APWG Symposium on Electronic Crime Research (eCrime)
    San Diego, CA, May 2018.
    PDF

  • Community Finding of Malware and Exploit Vendors on Darkweb Marketplaces
    Ericsson Marin, Mohammed Almukaynizi, Eric Nunes, Paulo Shakarian
    IEEE International Conference on Data Intelligence and Security (ICDIS)
    South Padre Island, TX, April 2018.
    Link

  • Predicting Cyber Threats through User Connectivity in Darkweb and Deepweb Forums
    Mohammed Almukaynizi, Alex Grimm,, Eric Nunes, Jana Shakarian, Paulo Shakarian
    ACM Computational Social Science (CSS)
    Santa Fe, NM, November 2017.
    PDF

  • Proactive Identification of Exploits in the Wild Through Vulnerability Mentions Online
    Mohammed Almukaynizi, Eric Nunes, Krishna Dharaiya, Manoj Senguttuvan, Jana Shakarian, Paulo Shakarian
    International Conference on Cyber Conflict (CyCon-US)
    Washington, D.C., November 2017.
    PDF

  • Measuring Cyber Attribution In Games
    Andrew Ruef, Eric Nunes, Paulo Shakarian, Gerardo I. Simari
    IEEE APWG Symposium on Electronic Crime Research (eCrime)
    Scottsdale, AZ, April 2017.
    Link

  • Darknet Mining and Game Theory for Enhanced Cyber Threat Intelligence
    John Robertson, Ahmad Diab, Ericsson Marin, Eric Nunes, Vivin Paliath, Jana Shakarian, Paulo Shakarian
    The Cyber Defense Review
    October 2016.
    PDF

  • Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence
    Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin, Vineet Mishra, Vivin Paliath,
    John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian
    IEEE Conference on Intelligence and Security Informatics (ISI)
    Tuscan, AZ, September 2016.
    PDF

  • Argumentation Models for Cyber Attribution
    Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Andrew Ruef
    IEEE/ACM International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI)
    San Francisco, CA, August 2016.
    PDF Best Paper Award

  • Toward Argumentation-Based Cyber-attribution
    Eric Nunes, Paulo Shakarian, Gerardo I. Simari
    AAAI Workshop on Cyber security (AICS)
    Phoenix, AZ, February 2016.
    PDF

  • Malware Task Identification: A Data Driven Approach
    Eric Nunes, Casey Buto, Paulo Shakarian Christian Lebiere, Stefano Bennati, Robert Thomson, Holger Jaenisch
    IEEE/ACM International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI)
    Paris, France, August 2015.
    PDF

  • Cyber-Deception and Attribution in Capture-the-Flag Exercises
    Eric Nunes, Nimish Kulkarni, Paulo Shakarian, Andrew Ruef, Jay Little
    IEEE/ACM International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI)
    Paris, France, August 2015.
    PDF

  • Functional cognitive models of malware identification
    Christian Lebiere, Stefano Bennati, Robert Thomson, Paulo Shakarian, Eric Nunes
    International Conference on Cognitive Modeling (ICCM)
    Groningen, The Netherlands, April 2015.
    PDF

  • Malware identification using cognitively inspired inference
    Robert Thomson, Christian Lebiere, Stefano Bennati, Paulo Shakarian, Eric Nunes
    Behavior Representation in Modeling and Simulation (BRiMS)
    Washington, March 2015.
    PDF