Systems and Methods for Third Party Risk Assessment
Eric Nunes, Krishna Dharaiya, Jana Shakarian, Paulo Shakarian
Provisional: 62/668,871
Systems and Methods for predicting which software vulnerabilities will be exploited by malicious hackers to prioritize for Patching
Eric Nunes, Mohammed Almukaynizi, Krishna Dharaiya, Jana Shakarian, Paulo Shakarian,
Manoj Balasubramaniam Senguttuvan, Alexander Grimm
Provisional: 62/581,123
Systems and Methods for Data Driven Malware Task Identification
Eric Nunes, Casey Buto, Paulo Shakarian Christian Lebiere, Stefano Bennati, Robert Thomson
Patent: 20,160,371,490
Intelligent darkweb crawling infrastructure for cyber threat intelligence collection
Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin, Vineet Mishra, Vivin Paliath,
John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian
Licensed by CYR3CON
Provisional: 62/409,291
Artificial Intelligence Tools for Cyber Attribution
Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Andrew Ruef
Springer, 2018.
Link
Darkweb Cyber Threat Intelligence Mining
John Robertson, Ahmad Diab, Ericsson Marin, Eric Nunes,
Vivin Paliath, Jana Shakarian, Paulo Shakarian
Cambridge University Press, 2017.
Link
Cyber-Deception and Attribution in Capture-the-Flag Exercises (Extended version)
Eric Nunes, Nimish Kulkarni, Paulo Shakarian, Andrew Ruef, Jay Little
Cyber Deception: Building the Scientific Foundation
Editors: S. Jajodia, V.S. Subrahmanian, V. Swarup, C. Wang
Springer, 2016.
Link
At-Risk System Identification via Analysis of Discussions on the Darkweb
Eric Nunes, Paulo Shakarian, Gerardo I. Simari
IEEE APWG Symposium on Electronic Crime Research (eCrime)
San Diego, CA, May 2018.
PDF
Community Finding of Malware and Exploit Vendors on Darkweb Marketplaces
Ericsson Marin, Mohammed Almukaynizi, Eric Nunes, Paulo Shakarian
IEEE International Conference on Data Intelligence and Security (ICDIS)
South Padre Island, TX, April 2018.
Link
Predicting Cyber Threats through User Connectivity in Darkweb and Deepweb Forums
Mohammed Almukaynizi, Alex Grimm,, Eric Nunes, Jana Shakarian, Paulo Shakarian
ACM Computational Social Science (CSS)
Santa Fe, NM, November 2017.
PDF
Proactive Identification of Exploits in the Wild Through Vulnerability Mentions Online
Mohammed Almukaynizi, Eric Nunes, Krishna Dharaiya, Manoj Senguttuvan,
Jana Shakarian, Paulo Shakarian
International Conference on Cyber Conflict (CyCon-US)
Washington, D.C., November 2017.
PDF
Measuring Cyber Attribution In Games
Andrew Ruef, Eric Nunes, Paulo Shakarian, Gerardo I. Simari
IEEE APWG Symposium on Electronic Crime Research (eCrime)
Scottsdale, AZ, April 2017.
Link
Darknet Mining and Game Theory for Enhanced Cyber Threat Intelligence
John Robertson, Ahmad Diab, Ericsson Marin, Eric Nunes,
Vivin Paliath, Jana Shakarian, Paulo Shakarian
The Cyber Defense Review
October 2016.
PDF
Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence
Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin, Vineet Mishra,
Vivin Paliath,
John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian
IEEE Conference on Intelligence and Security Informatics (ISI)
Tuscan, AZ, September 2016.
PDF
Argumentation Models for Cyber Attribution
Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Andrew Ruef
IEEE/ACM International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI)
San Francisco, CA, August 2016.
PDF
Best Paper Award
Toward Argumentation-Based Cyber-attribution
Eric Nunes, Paulo Shakarian, Gerardo I. Simari
AAAI Workshop on Cyber security (AICS)
Phoenix, AZ, February 2016.
PDF
Malware Task Identification: A Data Driven Approach
Eric Nunes, Casey Buto, Paulo Shakarian Christian Lebiere, Stefano Bennati, Robert Thomson, Holger Jaenisch
IEEE/ACM International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI)
Paris, France, August 2015.
PDF
Cyber-Deception and Attribution in Capture-the-Flag Exercises
Eric Nunes, Nimish Kulkarni, Paulo Shakarian, Andrew Ruef, Jay Little
IEEE/ACM International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI)
Paris, France, August 2015.
PDF
Functional cognitive models of malware identification
Christian Lebiere, Stefano Bennati, Robert Thomson, Paulo Shakarian, Eric Nunes
International Conference on Cognitive Modeling (ICCM)
Groningen, The Netherlands, April 2015.
PDF
Malware identification using cognitively inspired inference
Robert Thomson, Christian Lebiere, Stefano Bennati, Paulo Shakarian, Eric Nunes
Behavior Representation in Modeling and Simulation (BRiMS)
Washington, March 2015.
PDF