Search Results - paulo+shakarian

9 Results Sort By:
Predicting Accuracy of a Machine Learning Model
In the realm of natural language processing, large language models (LLMs) have emerged as powerful tools capable of understanding and generating human-like text. In terms of accuracy, LLMs are known to have performance issues, specifically when reasoning tasks are involved. And despite their advancements, LLMs often face challenges when tasked with...
Published: 3/5/2024   |   Inventor(s): Paulo Shakarian, Noel Ngu, Lakshmivihari Mareedu, Abhinav Koyyalamudi
Keywords(s): Algorithm Development, Artificial Intelligence, Machine Learning, PS-Computing and Information Technology, PS-Educational, Software
Category(s): Computing & Information Technology, Educational, Physical Science
Predict Enterprise Cyber Incidents by Social Network Analysis on Dark Web Forums
There has been a rise in security breaches over the past few years, prompting an increasing need to mine insights from external discussion and social media platforms to raise alerts of possible attacks that might cater to specific industries. The dark web is one source of information on the internet where users can share information on software vulnerabilities...
Published: 8/8/2023   |   Inventor(s): Soumajyoti Sarkar, Mohammed Almukaynizi, Jana Shakarian, Paulo Shakarian
Keywords(s): Algorithm Development, Cyber Security, Darknet/Darkweb, Machine Learning, PS-Computing and Information Technology, Security, Social Media Monitoring
Category(s): Computing & Information Technology, Intelligence & Security, Physical Science
Third Party Risk Assessment Using Darkweb Keyword Searching
­Background Modern risk assessment may leverage various computing technologies to efficiently predict threats and associated risk. However, conventional risk assessment analysis does not consider unnatural disasters and other unforeseen events that can break down common modeling structure. For example, cyberattacks are generally perpetrated by individuals...
Published: 2/23/2023   |   Inventor(s): Eric Nunes, Krishna Dharaiya, Jana Shakarian, Paulo Shakarian
Keywords(s):  
Category(s): Computing & Information Technology, Intelligence & Security, Physical Science
Automatic Assignment of Labels to Discussion Topics Seen in Dark Web Forums
­Background The ability to traverse the internet with complete anonymity provides online platforms for illegal activities such as credit card fraud, identity theft, and leaks of sensitive information. One of the most prevalent cyber environments that has emerged over the last decade and enabled criminality are dark web forums, since they include...
Published: 2/23/2023   |   Inventor(s): Revanth Patil, Paulo Shakarian, Ashkan Aleali, Ericsson Marin
Keywords(s):  
Category(s): Physical Science, Computing & Information Technology, Intelligence & Security
Data Driven Malware Task Identification
Malicious software, or malware, is a type of coded program designed to damage/hack computer systems. Often, malware disables a user’s computer control, consequently leaving a user’s sensitive information vulnerable. Even though various types of firewall, anti-virus, and network security software all serve as layers of defense, they only...
Published: 2/23/2023   |   Inventor(s): Paulo Shakarian, Eric Nunes, Casey Buto, Christian Lebiere, Robert Thomson, Stefano Bennati
Keywords(s):  
Category(s): Applied Technologies, Computing & Information Technology, Physical Science, Wireless & Networking
Causal Rule Learning for Combat Information
Combat groups like the Islamic State of Iraq and al-Sham (ISIS) have taken the lives of thousands as they attempt to gain control of more cities. In order to stop ISIS’s oppression and tyranny, it is necessary to determine their method of military operation. Therefore, there is a need to create a model that accurately depicts and simulates the...
Published: 2/23/2023   |   Inventor(s): Paulo Shakarian, Andrew Stanton, Amanda Thart, Ashish Jain, Priyank Vyas, Arpan Chatterjee
Keywords(s): Data Mining
Category(s): Computing & Information Technology
MIST: Missing Person Intelligence Synthesis Toolkit
Missing person cases have been on the rise in the United States for the past twenty years. Currently, approximately 4,000 people go missing every day. Of those 4,000 cases, over 500 missing person cases go unsolved per day. Furthermore, many of these missing person cases are associated with human trafficking. By utilizing software tools, resources can...
Published: 2/23/2023   |   Inventor(s): Elham Shaabani, Kelly Snyder, Paulo Shakarian, Hamidreza Alvari
Keywords(s): Defense/military, Law Enforcement, Machine Learning
Category(s): Applied Technologies, Computing & Information Technology, Physical Science
VPRED: Violence Prediction Software
Gang violence in the United States accounts for 20 to 50 percent of homicides in many major cities each year. Law enforcement have existing data on many of these groups, such as the underlying social network structure. This information has previously proven useful in enabling smart policing tactics and improving law enforcement's understanding of...
Published: 2/23/2023   |   Inventor(s): Paulo Shakarian, Elham Shaabani, Ashkan Aleali
Keywords(s): Law Enforcement
Category(s): Applied Technologies, Computing & Information Technology, Physical Science, Wireless & Networking
Cascade Prediction
In social media, the term “viral” refers to when a piece of information (microblog, photograph, video, link, etc.) starts to spread in a social network and increases in popularity by an order-of-magnitude. Much work is currently being done to better understand the patterns and implications of this new phenomenon. Previous studies have devised...
Published: 2/23/2023   |   Inventor(s): Paulo Shakarian, Ruocheng Guo, Elham Shaabani, Abhinav Bhatnagar
Keywords(s): Social Media, Social Media Monitoring, Social Search
Category(s): Applied Technologies, Computing & Information Technology, Physical Science, Wireless & Networking