Proactive Identification of Exploits in the Wild through Vulnerability Mentions Online. Almukaynizi, M., Nunes, E., Dhariya, K., Senguttuvan, M., Shakarian, J., & Shakarian, P. In 2017 International Conference on Cyber Conflict (CyCon U.S.), 2017.
Link
Paper bibtex 1 download @inproceedings{almukaynizi:cycon,
author = "Mohammed Almukaynizi and Eric Nunes and Krishna Dhariya and Manoj Senguttuvan and Jana Shakarian and Paulo Shakarian",
title = "Proactive Identification of Exploits in the Wild through Vulnerability Mentions Online",
booktitle = {2017 International Conference on Cyber Conflict (CyCon U.S.)},
Year = {2017},
urlLink = {https://ieeexplore.ieee.org/document/8167501},
urlPaper = {http://usc-isi-i2.github.io/papers/almukaynizi17-cycon.pdf}
}
Downloads: 1
{"_id":"TuarsgJjpxqqT5Bar","bibbaseid":"almukaynizi-nunes-dhariya-senguttuvan-shakarian-shakarian-proactiveidentificationofexploitsinthewildthroughvulnerabilitymentionsonline-2017","downloads":1,"creationDate":"2018-11-05T20:44:13.155Z","title":"Proactive Identification of Exploits in the Wild through Vulnerability Mentions Online","author_short":["Almukaynizi, M.","Nunes, E.","Dhariya, K.","Senguttuvan, M.","Shakarian, J.","Shakarian, P."],"year":2017,"bibtype":"inproceedings","biburl":"usc-isi-i2.github.io/effect/doc/complete.bib","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Mohammed"],"propositions":[],"lastnames":["Almukaynizi"],"suffixes":[]},{"firstnames":["Eric"],"propositions":[],"lastnames":["Nunes"],"suffixes":[]},{"firstnames":["Krishna"],"propositions":[],"lastnames":["Dhariya"],"suffixes":[]},{"firstnames":["Manoj"],"propositions":[],"lastnames":["Senguttuvan"],"suffixes":[]},{"firstnames":["Jana"],"propositions":[],"lastnames":["Shakarian"],"suffixes":[]},{"firstnames":["Paulo"],"propositions":[],"lastnames":["Shakarian"],"suffixes":[]}],"title":"Proactive Identification of Exploits in the Wild through Vulnerability Mentions Online","booktitle":"2017 International Conference on Cyber Conflict (CyCon U.S.)","year":"2017","urllink":"https://ieeexplore.ieee.org/document/8167501","urlpaper":"http://usc-isi-i2.github.io/papers/almukaynizi17-cycon.pdf","bibtex":"@inproceedings{almukaynizi:cycon,\n\tauthor = \"Mohammed Almukaynizi and Eric Nunes and Krishna Dhariya and Manoj Senguttuvan and Jana Shakarian and Paulo Shakarian\",\n\ttitle = \"Proactive Identification of Exploits in the Wild through Vulnerability Mentions Online\",\n\tbooktitle = {2017 International Conference on Cyber Conflict (CyCon U.S.)},\n\tYear = {2017},\n\turlLink = {https://ieeexplore.ieee.org/document/8167501},\n\turlPaper = {http://usc-isi-i2.github.io/papers/almukaynizi17-cycon.pdf}\n\t}\n\n","author_short":["Almukaynizi, M.","Nunes, E.","Dhariya, K.","Senguttuvan, M.","Shakarian, J.","Shakarian, P."],"key":"almukaynizi:cycon","id":"almukaynizi:cycon","bibbaseid":"almukaynizi-nunes-dhariya-senguttuvan-shakarian-shakarian-proactiveidentificationofexploitsinthewildthroughvulnerabilitymentionsonline-2017","role":"author","urls":{"Link":"https://ieeexplore.ieee.org/document/8167501","Paper":"http://usc-isi-i2.github.io/papers/almukaynizi17-cycon.pdf"},"metadata":{"authorlinks":{}},"downloads":1,"html":""},"search_terms":["proactive","identification","exploits","wild","through","vulnerability","mentions","online","almukaynizi","nunes","dhariya","senguttuvan","shakarian","shakarian"],"keywords":[],"authorIDs":[],"dataSources":["HpnQRRmf58uWKzqnE","ApmvupupDM5aDhkZW"]}