default search action
Ehsan Aghaei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i6]Ehsan Aghaei, Ehab Al-Shaer:
CVE-driven Attack Technique Prediction with Semantic Information Extraction and a Domain-specific Language Model. CoRR abs/2309.02785 (2023) - [i5]Ehsan Aghaei, Ehab Al-Shaer, Waseem G. Shadid, Xi Niu:
Automated CVE Analysis for Threat Prioritization and Impact Prediction. CoRR abs/2309.03040 (2023) - 2022
- [c5]Ehsan Aghaei, Xi Niu, Waseem G. Shadid, Ehab Al-Shaer:
SecureBERT: A Domain-Specific Language Model for Cybersecurity. SecureComm 2022: 39-56 - [i4]Ehsan Aghaei, Xi Niu, Waseem G. Shadid, Ehab Al-Shaer:
Language Model for Text Analytic in Cybersecurity. CoRR abs/2204.02685 (2022) - 2020
- [c4]Md Sajidul Islam Sajid, Jinpeng Wei, Md Rabbi Alam, Ehsan Aghaei, Ehab Al-Shaer:
DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of Malware. CNS 2020: 1-9 - [c3]Adam Dalton, Ehsan Aghaei, Ehab Al-Shaer, Archna Bhatia, Esteban Castillo, Zhuo Cheng, Sreekar Dhaduvai, Qi Duan, Bryanna Hebenstreit, Md. Mazharul Islam, Younes Karimi, Amir Masoumzadeh, Brodie Mather, Sashank Santhanam, Samira Shaikh, Alan Zemel, Tomek Strzalkowski, Bonnie J. Dorr:
Active Defense Against Social Engineering: The Case for Human Language Technology. STOC@LREC 2020: 1-8 - [c2]Ehsan Aghaei, Waseem G. Shadid, Ehab Al-Shaer:
ThreatZoom: Hierarchical Neural Network for CVEs to CWEs Classification. SecureComm (1) 2020: 23-41 - [i3]Adam Dalton, Ehsan Aghaei, Ehab Al-Shaer, Archna Bhatia, Esteban Castillo, Zhuo Cheng, Sreekar Dhaduvai, Qi Duan, Md. Mazharul Islam, Younes Karimi, Amir Masoumzadeh, Brodie Mather, Sashank Santhanam, Samira Shaikh, Tomek Strzalkowski, Bonnie J. Dorr:
The Panacea Threat Intelligence and Active Defense Platform. CoRR abs/2004.09662 (2020) - [i2]Ehsan Aghaei, Waseem G. Shadid, Ehab Al-Shaer:
ThreatZoom: CVE2CWE using Hierarchical Neural Network. CoRR abs/2009.11501 (2020)
2010 – 2019
- 2019
- [c1]Ehsan Aghaei, Ehab Al-Shaer:
ThreatZoom: neural network for automated vulnerability mitigation. HotSoS 2019: 24:1-24:3 - [i1]Ehsan Aghaei, Gürsel Serpen:
Host-based anomaly detection using Eigentraces feature extraction and one-class classification on system call trace data. CoRR abs/1911.11284 (2019) - 2018
- [j2]Gürsel Serpen, Ehsan Aghaei:
Host-based misuse intrusion detection using PCA feature extraction and kNN classification algorithms. Intell. Data Anal. 22(5): 1101-1114 (2018) - 2017
- [j1]Ehsan Aghaei, Gürsel Serpen:
Ensemble classifier for misuse detection using N-gram feature vectors through operating system call traces. Int. J. Hybrid Intell. Syst. 14(3): 141-154 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint