Eric Nunes
Eric Nunes
Applied Intelligence and Research @ PayPal, Arizona State University
Verified email at asu.edu - Homepage
Title
Cited by
Cited by
Year
Darknet and deepnet mining for proactive cybersecurity threat intelligence
E Nunes, A Diab, A Gunn, E Marin, V Mishra, V Paliath, J Robertson, ...
Intelligence and Security Informatics (ISI), 2016 IEEE Conference on, 7-12, 2016
1042016
Darkweb Cyber Threat Intelligence Mining
J Robertson, A Diab, E Marin, E Nunes, V Paliath, J Shakarian, ...
Cambridge University Press, 2017
462017
Proactive identification of exploits in the wild through vulnerability mentions online
M Almukaynizi, E Nunes, K Dharaiya, M Senguttuvan, J Shakarian, ...
2017 International Conference on Cyber Conflict (CyCon US), 82-88, 2017
322017
Cyber-Deception and Attribution in Capture-the-Flag Exercises
E Nunes, N Kulkarni, P Shakarian, A Ruef, J Little
Proceedings of the 2015 IEEE/ACM International Conference on Advances in …, 2015
192015
Darknet Mining and Game Theory for Enhanced Cyber Threat Intelligence
J Robertson, A Diab, E Marin, E Nunes, V Paliath, J Shakarian, ...
The Cyber Defense Review 1 (2), 95-122, 2016
112016
Functional cognitive models of malware identification
C Lebiere, S Bennati, R Thomson, P Shakarian, E Nunes
Proceedings of ICCM, ICCM, 9-11, 2015
112015
DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks
M Almukaynizi, E Marin, E Nunes, P Shakarian, GI Simari, D Kapoor, ...
2018 IEEE International Conference on Intelligence and Security Informatics …, 2018
102018
At-risk system identification via analysis of discussions on the darkweb
E Nunes, P Shakarian, GI Simari
2018 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2018
92018
Predicting cyber threats through hacker social networks in darkweb and deepweb forums
M Almukaynizi, A Grimm, E Nunes, J Shakarian, P Shakarian
Proceedings of the 2017 International Conference of The Computational Social …, 2017
82017
Predicting cyber threats through the dynamics of user connectivity in darkweb and deepweb forums
M Almukaynizi, A Grimm, E Nunes, J Shakarian, P Shakarian
ACM Computational Social Science., 2017
82017
Argumentation models for cyber attribution
E Nunes, P Shakarian, GI Simari, A Ruef
Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM …, 2016
82016
Toward argumentation-based cyber attribution
E Nunes, P Shakarian, GI Simari
30th AAAI Conference on Artificial Intelligence, AAAI 2016, 177-184, 2016
62016
Malware task identification: A data driven approach
E Nunes, C Buto, P Shakarian, C Lebiere, S Bennati, R Thomson, ...
2015 IEEE/ACM International Conference on Advances in Social Networks …, 2015
62015
Malware identification using cognitively-inspired inference
R Thomson, C Lebiere, S Bennati, P Shakarian, E Nunes
Proceedings of BRIMS, BRIMS, 2015
62015
Patch before exploited: An approach to identify targeted software vulnerabilities
M Almukaynizi, E Nunes, K Dharaiya, M Senguttuvan, J Shakarian, ...
AI in Cybersecurity, 81-113, 2019
52019
Patch Before Exploited: An Approach to Identify Targeted Software Vulnerabilities
M Almukaynizi, E Nunes, K Dharaiya, M Senguttuvan, J Shakarian, ...
AI in Cybersecurity, 81-113, 2019
52019
SYSTEMS AND METHODS FOR DATA DRIVEN MALWARE TASK IDENTIFICATION
P Shakarian, E Nunes, C Buto, C Lebiere, R Thomson, S Bennati
US Patent 20,160,371,490, 2016
52016
Predicting Hacker Adoption on Darkweb Forums Using Sequential Rule Mining
E Marin, M Almukaynizi, E Nunes, J Shakarian, P Shakarian
2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018
42018
Community Finding of Malware and Exploit Vendors on Darkweb Marketplaces
E Marin, M Almukaynizi, E Nunes, P Shakarian
2018 1st International Conference on Data Intelligence and Security (ICDIS …, 2018
32018
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale
A Oest, P Zhang, B Wardman, E Nunes, J Burgis, A Zand, K Thomas, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 2020
22020
The system can't perform the operation now. Try again later.
Articles 1–20