Description: Ph.D. Candidate | Software Security | Software Engineering | Cyberthreat Intelligence
machine learning (3372) software engineering (1150) text mining (64) software security (36) cyberthreat intelligence (2)
North Carolina State University
I am currently working as a Research Assistant supervised by Dr. Laurie Williams . I am investigating the occurrence patterns of adversarial techniques reported in cyberattack-related articles. I use data mining techniques such as association rule mining to investigate the technique’s co-occurrence patterns. I am also working on text-mining approaches to extract the sequence of adversarial actions that constitute cyberattacks. My goal is to identify the patterns among techniques and how we can utilize these
University of Dhaka