Follow
Eric Nunes
Title
Cited by
Cited by
Year
Darknet and deepnet mining for proactive cybersecurity threat intelligence
E Nunes, A Diab, A Gunn, E Marin, V Mishra, V Paliath, J Robertson, ...
Intelligence and Security Informatics (ISI), 2016 IEEE Conference on, 7-12, 2016
2132016
Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale
A Oest, P Zhang, B Wardman, E Nunes, J Burgis, A Zand, K Thomas, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 2020
882020
Darkweb Cyber Threat Intelligence Mining
J Robertson, A Diab, E Marin, E Nunes, V Paliath, J Shakarian, ...
Cambridge University Press, 2017
712017
Proactive identification of exploits in the wild through vulnerability mentions online
M Almukaynizi, E Nunes, K Dharaiya, M Senguttuvan, J Shakarian, ...
2017 International Conference on Cyber Conflict (CyCon US), 82-88, 2017
642017
DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks
M Almukaynizi, E Marin, E Nunes, P Shakarian, GI Simari, D Kapoor, ...
2018 IEEE International Conference on Intelligence and Security Informatics …, 2018
302018
Predicting cyber threats through hacker social networks in darkweb and deepweb forums
M Almukaynizi, A Grimm, E Nunes, J Shakarian, P Shakarian
Proceedings of the 2017 International Conference of The Computational Social …, 2017
262017
Cyber-Deception and Attribution in Capture-the-Flag Exercises
E Nunes, N Kulkarni, P Shakarian, A Ruef, J Little
Proceedings of the 2015 IEEE/ACM International Conference on Advances in …, 2015
262015
At-risk system identification via analysis of discussions on the darkweb
E Nunes, P Shakarian, GI Simari
2018 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2018
252018
Patch before exploited: An approach to identify targeted software vulnerabilities
M Almukaynizi, E Nunes, K Dharaiya, M Senguttuvan, J Shakarian, ...
AI in Cybersecurity, 81-113, 2019
232019
Patch Before Exploited: An Approach to Identify Targeted Software Vulnerabilities
M Almukaynizi, E Nunes, K Dharaiya, M Senguttuvan, J Shakarian, ...
AI in Cybersecurity, 81-113, 2019
232019
Argumentation models for cyber attribution
E Nunes, P Shakarian, GI Simari, A Ruef
Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM …, 2016
222016
An argumentation-based reasoner to assist digital investigation and attribution of cyber-attacks
E Karafili, L Wang, EC Lupu
Forensic Science International: Digital Investigation 32, 300925, 2020
202020
SYSTEMS AND METHODS FOR DATA DRIVEN MALWARE TASK IDENTIFICATION
P Shakarian, E Nunes, C Buto, C Lebiere, R Thomson, S Bennati
US Patent 20,160,371,490, 2016
172016
Darknet Mining and Game Theory for Enhanced Cyber Threat Intelligence
J Robertson, A Diab, E Marin, E Nunes, V Paliath, J Shakarian, ...
The Cyber Defense Review 1 (2), 95-122, 2016
172016
Community Finding of Malware and Exploit Vendors on Darkweb Marketplaces
E Marin, M Almukaynizi, E Nunes, P Shakarian
2018 1st International Conference on Data Intelligence and Security (ICDIS …, 2018
152018
Predicting cyber threats through the dynamics of user connectivity in darkweb and deepweb forums
M Almukaynizi, A Grimm, E Nunes, J Shakarian, P Shakarian
ACM Computational Social Science., 2017
152017
Systems and methods for predicting the likelihood of cyber-threats leveraging intelligence associated with hacker communities
M Almukaynizi, E Marin, P Shakarian, G Simari, E Nunes
US Patent App. 16/522,001, 2020
142020
Predicting Hacker Adoption on Darkweb Forums Using Sequential Rule Mining
E Marin, M Almukaynizi, E Nunes, J Shakarian, P Shakarian
2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018
132018
Functional cognitive models of malware identification
C Lebiere, S Bennati, R Thomson, P Shakarian, E Nunes
Proceedings of ICCM, ICCM, 9-11, 2015
102015
Toward argumentation-based cyber attribution
E Nunes, P Shakarian, GI Simari
30th AAAI Conference on Artificial Intelligence, AAAI 2016, 177-184, 2016
82016
The system can't perform the operation now. Try again later.
Articles 1–20