Sledovat
Ben Uribe Lazarine
Název
Citace
Citace
Rok
Identifying, collecting, and presenting hacker community data: Forums, IRC, carding shops, and DNMs
PY Du, N Zhang, M Ebrahimi, S Samtani, B Lazarine, N Arnold, R Dunn, ...
2018 IEEE international conference on intelligence and security informatics …, 2018
50*2018
Dark-net ecosystem cyber-threat intelligence (CTI) tool
N Arnold, M Ebrahimi, N Zhang, B Lazarine, M Patton, H Chen, S Samtani
2019 IEEE International Conference on Intelligence and Security Informatics …, 2019
392019
Assessing the vulnerabilities of the open-source artificial intelligence (ai) landscape: A large-scale analysis of the hugging face platform
A Kathikar, A Nair, B Lazarine, A Sachdeva, S Samtani
2023 IEEE International Conference on Intelligence and Security Informatics …, 2023
292023
Identifying vulnerable GitHub repositories and users in scientific cyberinfrastructure: An unsupervised graph embedding approach
B Lazarine, S Samtani, M Patton, H Zhu, S Ullman, B Ampel, H Chen
2020 IEEE International Conference on Intelligence and Security Informatics …, 2020
272020
Smart vulnerability assessment for scientific cyberinfrastructure: An unsupervised graph embedding approach
S Ullman, S Samtani, B Lazarine, H Zhu, B Ampel, M Patton, H Chen
2020 IEEE International Conference on Intelligence and Security Informatics …, 2020
142020
Exploring the propagation of vulnerabilities from GitHub repositories hosted by major technology organizations
B Lazarine, Z Zhang, A Sachdeva, S Samtani, H Zhu
Proceedings of the 15th Workshop on Cyber Security Experimentation and Test …, 2022
42022
The Role of AI Agents for De-Escalating Commitment in Digital Innovation Projects.
C Marx, B Ampel, B Lazarine
ICIS, 2021
22021
Enhancing Vulnerability Prioritization in Cloud Computing Using Multi-View Representation Learning
S Ullman, S Samtani, H Zhu, B Lazarine, H Chen, JF Nunamaker Jr
Journal of Management Information Systems 41 (3), 708-743, 2024
12024
User profiling and vulnerability introduction prediction in social coding repositories: A dynamic graph embedding approach: Vulnerability introduction prediction in social …
A Sachdeva, B Lazarine, H Zhu, S Samtani
Proceedings of the 16th Cyber Security Experimentation and Test Workshop, 19-25, 2023
12023
Collecting, Linking, and Assessing Machine Learning Open-Source Software: A Large Scale Collection and Vulnerability Assessment Pipeline
B Lazarine, S Pulipaka, S Samtani, R Venkataraman
2025
Suggesting Alternatives for Potentially Insecure Artificial IntelligenceRepositories: An Unsupervised Graph Embedding Approach
B Lazarine, S Samtani, H Zhu, R Venkataraman
Hawaii International Conference on Systems Sciences (HICSS), 2024., 2024
2024
Identifying Patterns of Vulnerability Incidence in Foundational Machine Learning Repositories on GitHub: An Unsupervised Graph Embedding Approach
A Sachdeva, B Lazarine, R Dama, S Samtani, H Zhu
2022 IEEE International Conference on Data Mining Workshops (ICDMW), 1-8, 2022
2022
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–12