Journal Publications:

  1. S. Ullman, S. Samtani, H. Zhu, B. Lazarine, and H. Chen (2024) “Enhancing Vulnerability Prioritization in Cloud Computing: Grouping Vulnerable Virtual Machines using Multi-View Representation Learning” Accepted at Journal of Management Information Systems (JMIS).

  2. B. Ampel, S. Ullman. (2023) “Why Following Friends Can Hurt You: A Replication Study,” AIS Transactions on Replication Research (TRR), 9(1):1-15.

Journal Papers Under Review:

  1. S. Ullman, H. Zhu, S. Samtani, and H. Chen “Linking Vulnerabilities in Cyberinfrastructure With Their Remediations: A Contrastive Representation Learning Approach” Under Review (First Round) at Information Systems Research (ISR).

Work-In-Progress Journal Papers:

  1. C. Yang, S. Ullman, S. Samtani, H. Zhu, and H. Chen “Exploring the Propagation of Vulnerabilities in FinTech Payment Applications on GitHub: A Deep Node Ranking Approach” Preparing for Submission to Information Systems Research (ISR).

  2. A. Ndubizu, S. Ullman, S. Samtani, H. Zhu, and H. Chen “Generating Security Nutrition Labels for Internet of Things Device GitHub Repositories: A Multi-Label Classification Approach” Preparing for Submission to MIS Quarterly (MISQ).

  3. B. Lazarine, S. Samtani, H. Zhu, S. Ullman, and H. Chen “Detecting and Grouping Vulnerable GitHub Repositories in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach” Preparing for Submission to Journal of Management Information Systems (JMIS).

  4. S. Ullman, “Replication of Internet Privacy Concerns in the Context of Smart Home Devices” Preparing for Submission to AIS Transactions on Replication Research (TRR).

  5. R. Reyes, S. Ullman, S. Samtani, and H. Chen “Identifying Vulnerability Persistence on Containers from Docker Hub: A Multi-View Learning Approach” Preparing for Submission to ACM Transactions on Management Information Systems (TMIS).

  6. S. Ullman, B. Lazarine, S. Samtani, H. Chen “Securing Software Application Deployments in Cloud Computing: A Graph Contrastive Learning Approach” Preparing for Submission to Information Systems Research (ISR).

  7. B. Lazarine, S. Ullman, H. Zhu, and S. Samtani “Suggesting Alternatives for Insecure Machine Learning Repositories: A Multi-View Graph Transformer Approach” Preparing for submission to Information Systems Research (ISR).

  8. A. Ndubizu, S. Ullman, S. Samtani, and H. Chen “Identifying Vulnerability Propagation in Quantum Source Code on GitHub: A Large-Language Model Code Clone Detection Approach” Preparing for submission to Information Systems Research (ISR).

    Refereed Conference Proceedings (* indicates I was the presenting author)

  9. *S. Ullman, S. Samtani, H. Zhu, B. Lazarine, B. Ampel, M. Patton, and H. Chen “Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach” IEEE Intelligence and Security Informatics (ISI). Rosslyn, VA (Virtual). November 2020.

  10. B. Ampel, S. Samtani, H. Zhu, S. Ullman, and H. Chen “Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach” IEEE Intelligence and Security Informatics (ISI). Rosslyn, VA (Virtual). November 2020. (Winner of the Best Paper Award).

  11. B. Lazarine, S. Samtani, M. Patton, H. Zhu, S. Ullman, B. Ampel, and H. Chen “Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach” IEEE Intelligence and Security Informatics (ISI). Rosslyn, VA (Virtual). November 2020.

Refereed Workshop Papers (No Proceedings; * indicates I was the presenting author)

  1. *S. Ullman and H. Chen “VulnSSL: Identifying Relevant Vulnerability Remediation Strategies Using Self-Supervised Learning” International Conference on Secure Knowledge Management (SKM). Tempe, AZ (Virtual). September 2023.

  2. B. Ampel, S. Samtani, S. Ullman, H. Chen “Linking Common Vulnerabilities and Exposures to the MITRE ATT&CK Framework: A Self-Distillation Approach” ACM KDD Workshop on AI-enabled Cybersecurity Analytics. Virtual Event. August 2021.