KMap

VOSviewer

Courses
  • ISRMDR
    Information Security, Risk Mgmt, Disaster Recovery

  • UMIS
    Using and Managing Information Systems

  • ISRM
    Information Security Risk Management

  • ITA
    Information Technology Audit

  • BII
    Business Intensive I

  • SMIS
    Strategic Management of Information Systems

  • CIS
    Computers and Internetworked Society

  • CTI
    Cyber Threat Intelligence

Grants
  • Funding agency logo
    Cybersecurity Scholarship-for-Service Renewal at The University of Arizona: The AZSecure SFS Program

    Co-Investigator (COI)

    2019

    $2.4M
    Active
  • Funding agency logo
    CICI: SSC: Proactive Cyber Threat Intelligence and Comprehensive Network Monitoring for Scientific Cyberinfrastructure: The AZSecure Framework

    Co-Investigator (COI)

    2019

    $998.0K
    Active
  • Funding agency logo
    CIF21 DIBBs: DIBBs for Intelligence and Security Informatics Research Community

    Co-Investigator (COI)

    2014

    $1.5M
  • Funding agency logo
    Cybersecurity Scholarship-for-Service at the University of Arizona

    Co-Investigator (COI)

    2013

    $5.3M
Technologies / Patents
      News
      • UArizona Researchers Go on Offense, Defense in Battle Against Hackers

        2019

      • Cybersecurity Students Benefit From Scholarship Program

        2019

      • $5.4M in Cybersecurity Grants Awarded to UA Regents' Professor Hsinchun Chen

        2013

      Publications (25)
      Recent
      • True News Versus Fake News: How Information Spreads Online

        2020

      • Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach

        2020

      • Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach

        2020

      • How Does Information Spread? An Exploratory Study of True and Fake News

        2019

      • Performance Modeling of Hyperledger Sawtooth Blockchain

        2019

      • Dark Net Ecosystem Cyber Threat Intelligence Tool

        2019

      • Dark-Net Ecosystem Cyber-Threat Intelligence (CTI) Tool

        2019

      • Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study

        2018

      • Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions

        2018

      • Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency

        2018

      • Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things

        2018

      • Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach

        2018

      • Identifying Vulnerabilities of Consumer Internet of Things (IoT) Devices: A Scalable Approach

        2017

      • Identifying Mobile Malware and Key Threat Actors in Online Hacker Forums for Proactive Cyber Threat Intelligence

        2017

      • Large Scale Port Scanning Through Tor Using Parallel Nmap Scans to Scan Large Portions of the IPv4 Range

        2017

      • Benchmarking Vulnerability Scanners: An Experiment on SCADA Devices and Scientific Instruments

        2017

      • Assessing Medical Device Vulnerabilities on the Internet of Things

        2017

      • SCADA Honeypots An In-depth Analysis of Conpot

        2016

      • Identifying Devices Across the IPv4 Address Space

        2016

      • Identifying Top Listers in Alphabay Using Latent Dirichlet Allocation

        2016

      • Shodan Visualized

        2016

      • Anonymous Port Scanning Performing Network Reconnaissance Through Tor

        2016

      • Identifying SCADA Vulnerabilities Using Passive and Active Vulnerability Assessment Techniques

        2016

      • Uninvited Connections A Study of Vulnerable Devices on the Internet of Things (IoT)

        2014

      • Embodied Conversational Agent-Based Kiosk for Automated Interviewing

        2011

      Grants
      Citations
      H-Index
      Patents
      News
      Books
      Opportunities