Waseem Shadid
YOU?
Author Swipe
View article: Automated CVE Analysis for Threat Prioritization and Impact Prediction
Automated CVE Analysis for Threat Prioritization and Impact Prediction Open
The Common Vulnerabilities and Exposures (CVE) are pivotal information for proactive cybersecurity measures, including service patching, security hardening, and more. However, CVEs typically offer low-level, product-oriented descriptions o…
View article: SecureBERT: A Domain-Specific Language Model for Cybersecurity
SecureBERT: A Domain-Specific Language Model for Cybersecurity Open
Natural Language Processing (NLP) has recently gained wide attention in cybersecurity, particularly in Cyber Threat Intelligence (CTI) and cyber automation. Increased connection and automation have revolutionized the world's economic and c…
View article: Optimization of High-Entropy Alloy Catalyst for Ammonia Decomposition and Ammonia Synthesis
Optimization of High-Entropy Alloy Catalyst for Ammonia Decomposition and Ammonia Synthesis Open
The successful synthesis of high entropy alloy (HEA) nanoparticles, a long-sought goal in materials science, opens a new frontier in materials science with applications across catalysis, electronics, structural alloys, and energetic materi…
View article: A system for 3D reconstruction of comminuted tibial plafond bone fractures
A system for 3D reconstruction of comminuted tibial plafond bone fractures Open
View article: A System for 3D Reconstruction Of Comminuted Tibial Plafond Bone Fractures
A System for 3D Reconstruction Of Comminuted Tibial Plafond Bone Fractures Open
High energy impacts at joint locations often generate highly fragmented, or comminuted, bone fractures. Current approaches for treatment require physicians to decide how to classify the fracture within a hierarchy fracture severity categor…
View article: Electric Model for Electromagnetic Wave Fields
Electric Model for Electromagnetic Wave Fields Open
This paper presents the first theoretical framework that defines the electric infinitesimal structure model of electromagnetic waves. This model represents the electromagnetic fields by electric field components only. These components have…
View article: ThreatZoom: CVE2CWE using Hierarchical Neural Network
ThreatZoom: CVE2CWE using Hierarchical Neural Network Open
The Common Vulnerabilities and Exposures (CVE) represent standard means for sharing publicly known information security vulnerabilities. One or more CVEs are grouped into the Common Weakness Enumeration (CWE) classes for the purpose of und…
View article: Machine-learning structural and electronic properties of metal halide perovskites using a hierarchical convolutional neural network
Machine-learning structural and electronic properties of metal halide perovskites using a hierarchical convolutional neural network Open
The development of statistical tools based on machine learning (ML) and deep networks is actively sought for materials design problems. While structure-property relationships can be accurately determined using quantum mechanical methods, t…
View article: The Electric Origin of Magnetic Forces Theory: General Framework
The Electric Origin of Magnetic Forces Theory: General Framework Open
This paper presents the first general framework to explain the magnetic force as a result of electric force interactions between current charges moving at any constant speed and combination. The explanation depends on analyzing the spreadi…
View article: Two New Theories for the Current Charge Relativity and the Electric Origin of the Magnetic Force Between Two Filamentary Current Elements
Two New Theories for the Current Charge Relativity and the Electric Origin of the Magnetic Force Between Two Filamentary Current Elements Open
This paper presents two new theories and a new current representation to\nexplain the magnetic force between two filamentary current elements as a result\nof electric force interactions between current charges. The first theory states\ntha…
View article: A prototypical system to virtually reconstruct high energy fracture events
A prototypical system to virtually reconstruct high energy fracture events Open
This paper presents a new computational system that seeks to estimate the dynamics of fracture event from a 3D CT image of the fractured limb and the (assumed) intact contra-lateral limb. A model of the intact limb anatomy prior to injury …