KMap
VOSviewer
Courses
- ISRMDRInformation Security, Risk Mgmt, Disaster Recovery
- UMISUsing and Managing Information Systems
- ISRMInformation Security Risk Management
- ITAInformation Technology Audit
- BIIBusiness Intensive I
- SMISStrategic Management of Information Systems
- CISComputers and Internetworked Society
- CTICyber Threat Intelligence
Grants
- Cybersecurity Scholarship-for-Service Renewal at The University of Arizona: The AZSecure SFS Program
Co-Investigator (COI)
2019
$2.4M
Active - CICI: SSC: Proactive Cyber Threat Intelligence and Comprehensive Network Monitoring for Scientific Cyberinfrastructure: The AZSecure Framework
Co-Investigator (COI)
2019
$998.0K
Active - CIF21 DIBBs: DIBBs for Intelligence and Security Informatics Research Community
Co-Investigator (COI)
2014
$1.5M
- Cybersecurity Scholarship-for-Service at the University of Arizona
Co-Investigator (COI)
2013
$5.3M
Technologies / Patents
News
- UArizona Researchers Go on Offense, Defense in Battle Against Hackers
2019
- Cybersecurity Students Benefit From Scholarship Program
2019
- $5.4M in Cybersecurity Grants Awarded to UA Regents' Professor Hsinchun Chen
2013
Publications (25)
Recent
- True News Versus Fake News: How Information Spreads Online
2020
- Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach
2020
- Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach
2020
- How Does Information Spread? An Exploratory Study of True and Fake News
2019
- Performance Modeling of Hyperledger Sawtooth Blockchain
2019
- Dark Net Ecosystem Cyber Threat Intelligence Tool
2019
- Dark-Net Ecosystem Cyber-Threat Intelligence (CTI) Tool
2019
- Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study
2018
- Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions
2018
- Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency
2018
- Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things
2018
- Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach
2018
- Identifying Vulnerabilities of Consumer Internet of Things (IoT) Devices: A Scalable Approach
2017
- Identifying Mobile Malware and Key Threat Actors in Online Hacker Forums for Proactive Cyber Threat Intelligence
2017
- Large Scale Port Scanning Through Tor Using Parallel Nmap Scans to Scan Large Portions of the IPv4 Range
2017
- Benchmarking Vulnerability Scanners: An Experiment on SCADA Devices and Scientific Instruments
2017
- Assessing Medical Device Vulnerabilities on the Internet of Things
2017
- SCADA Honeypots An In-depth Analysis of Conpot
2016
- Identifying Devices Across the IPv4 Address Space
2016
- Identifying Top Listers in Alphabay Using Latent Dirichlet Allocation
2016
- Shodan Visualized
2016
- Anonymous Port Scanning Performing Network Reconnaissance Through Tor
2016
- Identifying SCADA Vulnerabilities Using Passive and Active Vulnerability Assessment Techniques
2016
- Uninvited Connections A Study of Vulnerable Devices on the Internet of Things (IoT)
2014
- Embodied Conversational Agent-Based Kiosk for Automated Interviewing
2011
Grants
Citations
H-Index
Patents
News
Books
Opportunities