Journal Publications:
-
S. Ullman, S. Samtani, H. Zhu, B. Lazarine, and H. Chen (2024) “Enhancing Vulnerability Prioritization in Cloud Computing: Grouping Vulnerable Virtual Machines using Multi-View Representation Learning” Accepted at Journal of Management Information Systems (JMIS).
-
B. Ampel, S. Ullman. (2023) “Why Following Friends Can Hurt You: A Replication Study,” AIS Transactions on Replication Research (TRR), 9(1):1-15.
Journal Papers Under Review:
- S. Ullman, H. Zhu, S. Samtani, and H. Chen “Linking Vulnerabilities in Cyberinfrastructure With Their Remediations: A Contrastive Representation Learning Approach” Under Review (First Round) at Information Systems Research (ISR).
Work-In-Progress Journal Papers:
-
C. Yang, S. Ullman, S. Samtani, H. Zhu, and H. Chen “Exploring the Propagation of Vulnerabilities in FinTech Payment Applications on GitHub: A Deep Node Ranking Approach” Preparing for Submission to Information Systems Research (ISR).
-
A. Ndubizu, S. Ullman, S. Samtani, H. Zhu, and H. Chen “Generating Security Nutrition Labels for Internet of Things Device GitHub Repositories: A Multi-Label Classification Approach” Preparing for Submission to MIS Quarterly (MISQ).
-
B. Lazarine, S. Samtani, H. Zhu, S. Ullman, and H. Chen “Detecting and Grouping Vulnerable GitHub Repositories in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach” Preparing for Submission to Journal of Management Information Systems (JMIS).
-
S. Ullman, “Replication of Internet Privacy Concerns in the Context of Smart Home Devices” Preparing for Submission to AIS Transactions on Replication Research (TRR).
-
R. Reyes, S. Ullman, S. Samtani, and H. Chen “Identifying Vulnerability Persistence on Containers from Docker Hub: A Multi-View Learning Approach” Preparing for Submission to ACM Transactions on Management Information Systems (TMIS).
-
S. Ullman, B. Lazarine, S. Samtani, H. Chen “Securing Software Application Deployments in Cloud Computing: A Graph Contrastive Learning Approach” Preparing for Submission to Information Systems Research (ISR).
-
B. Lazarine, S. Ullman, H. Zhu, and S. Samtani “Suggesting Alternatives for Insecure Machine Learning Repositories: A Multi-View Graph Transformer Approach” Preparing for submission to Information Systems Research (ISR).
- A. Ndubizu, S. Ullman, S. Samtani, and H. Chen “Identifying Vulnerability Propagation in Quantum Source Code on GitHub: A Large-Language Model Code Clone Detection Approach” Preparing for submission to Information Systems Research (ISR).
Refereed Conference Proceedings (* indicates I was the presenting author)
-
*S. Ullman, S. Samtani, H. Zhu, B. Lazarine, B. Ampel, M. Patton, and H. Chen “Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach” IEEE Intelligence and Security Informatics (ISI). Rosslyn, VA (Virtual). November 2020.
-
B. Ampel, S. Samtani, H. Zhu, S. Ullman, and H. Chen “Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach” IEEE Intelligence and Security Informatics (ISI). Rosslyn, VA (Virtual). November 2020. (Winner of the Best Paper Award).
- B. Lazarine, S. Samtani, M. Patton, H. Zhu, S. Ullman, B. Ampel, and H. Chen “Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach” IEEE Intelligence and Security Informatics (ISI). Rosslyn, VA (Virtual). November 2020.
Refereed Workshop Papers (No Proceedings; * indicates I was the presenting author)
-
*S. Ullman and H. Chen “VulnSSL: Identifying Relevant Vulnerability Remediation Strategies Using Self-Supervised Learning” International Conference on Secure Knowledge Management (SKM). Tempe, AZ (Virtual). September 2023.
-
B. Ampel, S. Samtani, S. Ullman, H. Chen “Linking Common Vulnerabilities and Exposures to the MITRE ATT&CK Framework: A Self-Distillation Approach” ACM KDD Workshop on AI-enabled Cybersecurity Analytics. Virtual Event. August 2021.