Search Results - jana+shakarian

2 Results

Sort By:

  1. There has been a rise in security breaches over the past few years, prompting an increasing need to mine insights from external discussion and social media platforms to raise alerts of possible attacks that might cater to specific industries. The dark web is one source of information on the internet where users can share information on software vulnerabilities...
    Published: 2/13/2025
  2. ­Background Modern risk assessment may leverage various computing technologies to efficiently predict threats and associated risk. However, conventional risk assessment analysis does not consider unnatural disasters and other unforeseen events that can break down common modeling structure. For example, cyberattacks are generally perpetrated by individuals...
    Published: 2/23/2023
    Keywords(s):  

Search Inventions

Looking for a technology or invention to commercialize? Arizona State University has more than 300 technologies available for licensing. Start your search here or submit your own invention.