The following publications are possibly variants of this publication:
- Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligenceJohn Grisham, Sagar Samtani, Mark W. Patton, Hsinchun Chen. isi 2017: 13-18 [doi]
- Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat IntelligenceSagar Samtani, Ryan Chinn, Hsinchun Chen, Jay F. Nunamaker Jr.. jmis, 34(4):1023-1053, 2017. [doi]
- Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning ApproachBenjamin Ampel, Sagar Samtani, Hongyi Zhu, Steven Ullman, Hsinchun Chen. isi 2020: 1-6 [doi]