Ghaith Husari
TitleCited byYear
IoTSAT: A formal framework for security analysis of the internet of things (IoT)
M Mohsin, Z Anwar, G Husari, E Al-Shaer, MA Rahman
2016 IEEE Conference on Communications and Network Security (CNS), 180-188, 2016
TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources
G Husari, E Al-Shaer, M Ahmed, B Chu, X Niu
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
Using NLP for cybersecurity. Extracting Cyber Attack Behaviors from Text
G Husari, E Al-Shaer, M Ahmed, B Chu, X Niu
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
Machine learning approach for brain tumor detection
M Al-Ayyoub, G Husari, O Darwish, A Alabed-alaziz
Proceedings of the 3rd International Conference on Information and …, 2012
Towards improving channel switching in cognitive radio networks
E Kanan, G Husari, M Al-Ayyoub, Y Jararweh
2015 6th International Conference on Information and Communication Systems …, 2015
SENA: preserving social structure for network embedding
S Hong, T Chakraborty, S Ahn, G Husari, N Park
Proceedings of the 28th ACM Conference on Hypertext and Social Media, 235-244, 2017
Optimizing the roi of cyber risk mitigation
MN Alsaleh, G Husari, E Al-Shaer
2016 12th International Conference on Network and Service Management (CNSM …, 2016
Improving Vertical Handoffs Using Mobility Prediction
M Al-Ayyoub, G Husari, W Mardini
International Journal of Advanced Computer Science and Applications(IJACSA …, 2016
ROI-driven cyber risk mitigation using host compliance and network configuration
MN Alsaleh, E Al-Shaer, G Husari
Journal of Network and Systems Management 25 (4), 759-783, 2017
Using entropy and mutual information to extract threat actions from cyber threat intelligence
G Husari, X Niu, B Chu, E Al-Shaer
2018 IEEE International Conference on Intelligence and Security Informatics …, 2018
A Model for Managing Medical Image Data on the Cloud
A Al-Badarneh, G Husari, H Najadat
LIFE: International Journal of Health and Life-Sciences 2 (3), 2016
Learning APT Chains from Cyber Threat Intelligence
G Husari, E Al-Shaer, B Chu, RF Rahman
2019 Hot Topics in Science and Security (HotSoS 2019), 2019
Data-Driven Analytics for Extracting and Inferring Threat Actions and Attack Patterns from the Unstructured Text of Cyber Threat Intelligence
G Husari
The University of North Carolina at Charlotte, 2019
Utilizing the Semantic Web and Constrained Optimization for Cyber Threat Intelligence
N Park, G Husari, BT Chu, E Al-Shaer
Comprehensive Risk Analytics: Augmenting Host Compliance with Network Configuration
MN Alsaleh, E Al-Shaer, G Husari
The system can't perform the operation now. Try again later.
Articles 1–15