Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Tidjani Négadi
Nobuyoshi Miyabayashi
Marc Bollmann
Chuanxiu Liu
Jhonathan Pinzon
Liangliang Shang
Giovanni Venturelli
Chen Ma
Jing-Sheng Wong
Radu Timofte
Home
/
Author
/
SHANCHIEH JAY YANG
Author Info
Open Visualization
Name
Affiliation
Papers
SHANCHIEH JAY YANG
Department of Computer Engineering, Rochester Institute of Technology, Rochester, NY
36
Collaborators
Citations
PageRank
48
131
23.11
Referers
Referees
References
379
516
229
Search Limit
100
516
Publications (36 rows)
Collaborators (48 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Towards an Efficient Detection of Pivoting Activity
0
0.34
2021
Enabling Visual Analytics via Alert-driven Attack Graphs
1
0.35
2021
Near real-time intrusion alert aggregation using concept-based learning
1
0.35
2021
On the Variety and Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks
0
0.34
2020
ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense.
1
0.38
2019
Synthetic Intrusion Alert Generation through Generative Adversarial Networks
0
0.34
2019
Dynamic Generation of Empirical Cyberattack Models with Engineered Alert Features
0
0.34
2019
CAPTURE: Cyberattack Forecasting Using Non-Stationary Features with Time Lags
0
0.34
2019
Differentiating and Predicting Cyberattack Behaviors Using LSTM
0
0.34
2018
Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts
0
0.34
2018
Forecasting Cyber Attacks with Imbalanced Data Sets and Different Time Granularities.
0
0.34
2018
Probabilistic Modeling and Inference for Obfuscated Cyber Attack Sequences.
0
0.34
2018
Forecasting cyberattacks with incomplete, imbalanced, and insignificant data.
2
0.38
2018
POSTER: Cyber Attack Prediction of Threats from Unconventional Resources (CAPTURE).
1
0.36
2017
Modeling Information Sharing Behavior on Q&A Forums.
0
0.34
2017
Predicting cyber attacks with bayesian networks using unconventional signals
2
0.39
2017
Privacy Sensitive Resource Access Monitoring for Android Systems
2
0.45
2015
Non-independent Cascade Formation: Temporal and Spatial Effects
3
0.40
2014
Probabilistic Inference for Obfuscated Network Attack Sequences
4
0.42
2014
Segmenting Large-Scale Cyber Attacks for Online Behavior Model Generation.
2
0.39
2014
Who Will Follow a New Topic Tomorrow?
0
0.34
2014
NRE: Suppress Selective Forwarding attacks in Wireless Sensor Networks
2
0.39
2014
Sequential modeling for obfuscated network attack action sequences.
1
0.37
2013
Introduction to the special section on social computing, behavioral-cultural modeling, and prediction
0
0.34
2013
Who shall we follow in twitter for cyber vulnerability?
4
0.68
2013
Optimizing collection requirements through analysis of plausible impact
0
0.34
2011
Discovering collaborative cyber attack patterns using social network analysis
4
0.49
2011
Characterizing Transition Behaviors in Internet Attack Sequences
4
0.52
2011
Social Computing, Behavioral-Cultural Modeling and Prediction - 4th International Conference, SBP 2011, College Park, MD, USA, March 29-31, 2011. Proceedings
46
8.15
2011
Issues and challenges in higher level fusion: Threat/impact assessment and intent modeling (a panel summary).
6
0.45
2010
Toward Ensemble Characterization and Projection of Multistage Cyber Attacks
11
0.68
2010
Clustering of multistage cyber attacks using significant services.
2
0.40
2010
Toward unsupervised classification of non-uniform cyber attack tracks
1
0.37
2009
FuSIA: Future Situation and Impact Awareness.
14
1.04
2008
Real-time fusion and Projection of network intrusion activity.
3
0.44
2008
Enhancing both network and user performance for networks supporting best effort traffic
14
0.87
2004
1