


default search action
Adaptive Autonomous Secure Cyber Systems, 2020
- Sushil Jajodia

, George Cybenko, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael P. Wellman
:
Adaptive Autonomous Secure Cyber Systems. Springer 2020, ISBN 978-3-030-33431-4 - Paul Théron, Alexander Kott, Martin Drasar, Krzysztof Rzadca, Benoît Leblanc, Mauno Pihelgas, Luigi V. Mancini, Fabio De Gaspari

:
Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems. 1-21 - Jinyuan Jia, Neil Zhenqiang Gong:

Defending Against Machine Learning Based Inference Attacks via Adversarial Examples: Opportunities and Challenges. 23-40 - Erik Hemberg, Linda Zhang, Una-May O'Reilly:

Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense. 41-61 - Chen Zhong

, John Yen, Peng Liu:
Can Cyber Operations Be Made Autonomous? An Answer from the Situational Awareness Viewpoint. 63-88 - Sridhar Venkatesan, Shridatt Sugrim, Jason A. Youzwak, Cho-Yu Jason Chiang, Ritu Chadha:

A Framework for Studying Autonomic Computing Models in Cyber Deception. 89-107 - Tao Hou, Tao Wang, Dakun Shen, Zhuo Lu, Yao Liu:

Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis. 109-129 - Mohammed Noraden Alsaleh, Ehab Al-Shaer:

Automated Cyber Risk Mitigation: Making Informed Cost-Effective Decisions. 131-157 - Yevgeniy Vorobeychik, Michael Pritchard:

Plan Interdiction Games. 159-182 - Aaron Schlenker, Omkar Thakoor, Haifeng Xu, Fei Fang

, Milind Tambe, Phebe Vayanos:
Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance. 183-204 - Linan Huang

, Quanyan Zhu:
Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense. 205-230 - Marcus Gutierrez, Christopher Kiekintveld:

Online Learning Methods for Controlling Dynamic Cyber Deception Strategies. 231-251 - Jiwon Hong, Taeri Kim, Jing Liu, Noseong Park, Sang-Wook Kim:

Phishing URL Detection with Lexical Features and Blacklisted Domains. 253-267 - Xinda Wang, Kun Sun, Archer L. Batcheller, Sushil Jajodia:

An Empirical Study of Secret Security Patch in Open Source Software. 269-289

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














