George Cybenko
Person information
- affiliation: Dartmouth College, Hanover, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – today
- 2019
- [j49]George Cybenko, Steve Huntsman:
Analytics for directed contact networks. Applied Network Science 4(1): 106:1-106:21 (2019) - [c33]George Cybenko:
Graph Models in Tracking Behaviors for Cyber-Security. GraMSec@CSF 2019: 3-6 - [p8]George Cybenko, Michael P. Wellman, Peng Liu, Minghui Zhu:
Overview of Control and Game Theory in Adaptive Cyber Defenses. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 1-11 - [p7]Massimiliano Albanese, Warren Connell, Sridhar Venkatesan, George Cybenko:
Moving Target Defense Quantification. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 94-111 - [p6]Massimiliano Albanese, Sushil Jajodia, Sridhar Venkatesan, George Cybenko, Thanh Nguyen:
Adaptive Cyber Defenses for Botnet Detection and Mitigation. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 156-205 - [p5]Benjamin W. Priest, George Cybenko, Satinder Singh, Massimiliano Albanese, Peng Liu:
Online and Scalable Adaptive Cyber Defense. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 232-261 - [e3]George Cybenko, David J. Pym, Barbara Fila:
5th International Workshop on Graphical Models for Security, held in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC 2018, Oxford, UK, July 8, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11086, Springer 2019, ISBN 978-3-030-15464-6 [contents] - [e2]Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael P. Wellman:
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security. Lecture Notes in Computer Science 11830, Springer 2019, ISBN 978-3-030-30718-9 [contents] - 2018
- [j48]Anne K. Cybenko, George Cybenko:
AI and Fake News. IEEE Intelligent Systems 33(5): 1-5 (2018) - [j47]Katheryn A. Farris, Ankit Shah, George Cybenko, Rajesh Ganesan, Sushil Jajodia
:
VULCON: A System for Vulnerability Prioritization, Mitigation, and Management. ACM Trans. Priv. Secur. 21(4): 16:1-16:28 (2018) - [c32]George Cybenko, Gabriel Fortunato Stocco:
Asymptotic Behavior of Attack Graph Games. From Database to Cyber Security 2018: 104-112 - [i4]Mark Chilenski, George Cybenko, Isaac Dekine, Piyush Kumar, Gil Raz:
Control Flow Graph Modifications for Improved RF-Based Processor Tracking Performance. CoRR abs/1809.07223 (2018) - [i3]Mark Chilenski, George Cybenko, Isaac Dekine, Piyush Kumar, Gil Raz:
Observability Properties of Colored Graphs. CoRR abs/1811.04803 (2018) - 2017
- [c31]George Cybenko:
Parallel Computing for Machine Learning in Social Network Analysis. IPDPS Workshops 2017: 1464-1471 - 2016
- [c30]Sridhar Venkatesan, Massimiliano Albanese
, George Cybenko, Sushil Jajodia
:
A Moving Target Defense Approach to Disrupting Stealthy Botnets. MTD@CCS 2016: 37-46 - [c29]George Cybenko:
ParSocial 2016 Keynote. IPDPS Workshops 2016: 1795 - [p4]George Cybenko, Gabriel Stocco, Patrick Sweeney:
Quantifying Covertness in Deceptive Cyber Operations. Cyber Deception 2016: 53-69 - 2015
- [c28]George Cybenko, Dijiang Huang:
MTD 2015: Second ACM Workshop on Moving Target Defense. ACM Conference on Computer and Communications Security 2015: 1709-1710 - [c27]George Cybenko:
Deep Learning of Behaviors for Security. IWSPA@CODASPY 2015: 1 - [c26]Wenyaw Chan, George Cybenko, Murat Kantarcioglu, Ernst L. Leiss, Thamar Solorio, Bhavani M. Thuraisingham, Rakesh M. Verma:
Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students. IWSPA@CODASPY 2015: 55-57 - [p3]Patrick Sweeney, George Cybenko:
Identifying and Exploiting the Cyber High Ground for Botnets. Cyber Warfare 2015: 37-56 - [e1]George Cybenko, Dijiang Huang:
Proceedings of the Second ACM Workshop on Moving Target Defense, MTD 2015, Denver, Colorado, USA, October 12, 2015. ACM 2015, ISBN 978-1-4503-3823-3 [contents] - 2014
- [j46]George Cybenko, Kathy Clark-Fisher:
IEEE Security & Privacy: The Early Years. IEEE Security & Privacy 12(3): 18-19 (2014) - [j45]George Cybenko, Eunice E. Santos:
Inaugural Issue Editorial. IEEE Trans. Comput. Social Systems 1(1): 1-2 (2014) - [c25]George Cybenko, Jeff Hughes:
No free lunch in cyber security. MTD@CCS 2014: 1-12 - [c24]George Cybenko, Sushil Jajodia, Michael P. Wellman, Peng Liu:
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation. ICISS 2014: 1-8 - 2013
- [j44]Valentino Crespi, George Cybenko, Annarita Giani:
Engineering Statistical Behaviors for Attacking and Defending Covert Channels. J. Sel. Topics Signal Processing 7(1): 124-136 (2013) - [p2]Daniel Bilar, George Cybenko, John P. Murphy:
Adversarial Dynamics: The Conficker Case Study. Moving Target Defense 2013: 41-71 - 2012
- [j43]George Cybenko, Carl E. Landwehr:
Security Analytics and Measurements. IEEE Security & Privacy 10(3): 5-8 (2012) - [c23]Vincent H. Berk, George Cybenko, Ian D. Gregorio-De Souza, John P. Murphy:
Managing Malicious Insider Risk through BANDIT. HICSS 2012: 2422-2430 - 2011
- [j42]George Cybenko, Valentino Crespi:
Learning Hidden Markov Models Using Nonnegative Matrix Factorization. IEEE Trans. Information Theory 57(6): 3963-3970 (2011) - [c22]Gabriel Fortunato Stocco, George Cybenko:
Exploiting Adversary's Risk Profiles in Imperfect Information Security Games. GameSec 2011: 22-33 - [i2]Valentino Crespi, George Cybenko, Annarita Giani:
Attacking and Defending Covert Channels and Behavioral Models. CoRR abs/1104.5071 (2011) - 2010
- [c21]Alexy Khrabrov, George Cybenko:
Discovering Influence in Communication Networks Using Dynamic Graph Analysis. SocialCom/PASSAT 2010: 288-294
2000 – 2009
- 2009
- [c20]Dave Twardowski, Robert Savell, George Cybenko:
Process learning of network interactions in market microstructures. CIFEr 2009: 51-57 - [c19]Alexy Khrabrov, George Cybenko:
A Language of Life: Characterizing People Using Cell Phone Tracks. CSE (4) 2009: 495-501 - 2008
- [j41]Lawrence Carin, George Cybenko, Jeff Hughes:
Cybersecurity Strategies: The QuERIES Methodology. IEEE Computer 41(8): 20-26 (2008) - [j40]Valentino Crespi, George Cybenko, Guofei Jiang:
The theory of trackability with applications to sensor networks. TOSN 4(3): 16:1-16:42 (2008) - [i1]George Cybenko, Valentino Crespi:
Learning Hidden Markov Models using Non-Negative Matrix Factorization. CoRR abs/0809.4086 (2008) - 2007
- [j39]George Cybenko, Vincent H. Berk:
Process Query Systems. IEEE Computer 40(1): 62-70 (2007) - [j38]Jason I. Hong, Mahadev Satyanarayanan
, George Cybenko:
Guest Editors' Introduction: Security & Privacy. IEEE Pervasive Computing 6(4): 15-17 (2007) - 2006
- [j37]George Cybenko:
Why Johnny Can't Evaluate Security Risk. IEEE Security & Privacy 4(1): 5 (2006) - [j36]George Cybenko:
Weak Links, Strong Ties. IEEE Security & Privacy 4(6): 3 (2006) - [j35]Guofei Jiang, George Cybenko, James A. Hendler:
Semantic Interoperability and Information Fluidity. Int. J. Cooperative Inf. Syst. 15(1): 1-22 (2006) - [c18]George Cybenko, Vincent H. Berk, Ian D. Gregorio-De Souza, Chad Behre:
Practical Autonomic Computing. COMPSAC (1) 2006: 3-14 - 2005
- [j34]John Yen, Robert L. Popp, George Cybenko, Latanya Sweeney, Paul Rosenzweig:
Homeland Security. IEEE Intelligent Systems 20(5): 76-86 (2005) - [j33]George Cybenko:
The One-Eyed Man Is King. IEEE Security & Privacy 3(4): 4-5 (2005) - [j32]Diego Hernando, Valentino Crespi, George Cybenko:
Efficient computation of the hidden Markov model entropy for a given observation sequence. IEEE Trans. Information Theory 51(7): 2681-2685 (2005) - [c17]Christopher Roblee, Vincent H. Berk, George Cybenko:
Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. ICAC 2005: 123-133 - [c16]Yong Sheng, George Cybenko:
Distance measures for nonparametric weak process models. SMC 2005: 722-727 - 2004
- [j31]Guofei Jiang, George Cybenko:
Functional Validation in Grid Computing. Autonomous Agents and Multi-Agent Systems 8(2): 119-130 (2004) - [j30]George Cybenko, Annarita Giani, Paul Thompson:
Cognitive Hacking. Advances in Computers 60: 35-73 (2004) - [j29]George Cybenko:
From the Editors: Don't Bring a Knife to a Gunfight. IEEE Security & Privacy 2(2): 5 (2004) - [j28]George Cybenko:
Security Alchemy. IEEE Security & Privacy 2(6): 5 (2004) - [p1]Paul Thompson, George Cybenko, Annarita Giani:
Cognitive Hacking. Economics of Information Security 2004: 255-287 - 2003
- [j27]George Cybenko:
A Critical Need, An Ambitious Mission, A New Magazine. IEEE Security & Privacy 1(1): 5-9 (2003) - [j26]George Cybenko:
From the Editor: Sapphire/Slammer Redux. IEEE Security & Privacy 1(2): 6 (2003) - [j25]George Cybenko:
Boiling Frogs? IEEE Security & Privacy 1(4): 5 (2003) - [j24]George Cybenko:
From the Editors: Privacy Is the Issue. IEEE Security & Privacy 1(6): 5-7 (2003) - [c15]Javed A. Aslam, Zack J. Butler, Florin Constantin, Valentino Crespi, George Cybenko, Daniela Rus:
Tracking a moving object with a binary sensor network. SenSys 2003: 150-161 - [c14]Guofei Jiang, George Cybenko, James A. Hendler:
Semantic depth and markup complexity. SMC 2003: 2138-2143 - 2002
- [j23]George Cybenko, Annarita Giani, Paul Thompson:
Cognitive Hacking: A Battle for the Mind. IEEE Computer 35(8): 50-56 (2002) - [j22]George Cybenko:
Understanding Quantum Computing [Book Review]. Computing in Science and Engineering 4(4): 92 (2002) - [j21]David Kotz
, George Cybenko, Robert S. Gray, Guofei Jiang, Ronald A. Peterson, Martin O. Hofmann, Daria A. Chacón, Kenneth R. Whitebread, James A. Hendler:
Performance Analysis of Mobile Agents for Filtering Data Streams on Wireless Networks. MONET 7(2): 163-174 (2002) - [j20]Robert S. Gray, George Cybenko, David Kotz
, Ronald A. Peterson, Daniela Rus:
D'Agents: Applications and performance of a mobile-agent system. Softw., Pract. Exper. 32(6): 543-573 (2002) - [j19]Santiago Aja-Fernández
, Carlos Alberola-López
, George Cybenko:
A fuzzy MHT algorithm applied to text-based information tracking. IEEE Trans. Fuzzy Systems 10(3): 360-374 (2002) - 2001
- [j18]George Cybenko:
Reducing quantum computations to elementary unitary operations. Computing in Science and Engineering 3(2): 27-32 (2001) - [j17]George Cybenko:
Machine learning [Book Review]. Computing in Science and Engineering 3(3): 95-96 (2001) - [j16]Katsuhiro Moizumi, George Cybenko:
The Traveling Agent Problem. MCSS 14(3): 213-232 (2001) - 2000
- [j15]Brian E. Brewington, George Cybenko:
How dynamic is the Web? Computer Networks 33(1-6): 257-276 (2000) - [j14]Brian E. Brewington, George Cybenko:
Keeping Up with the Changing Web. IEEE Computer 33(5): 52-58 (2000) - [c13]David Kotz, Guofei Jiang, Robert S. Gray, George Cybenko, Ronald A. Peterson:
Performance analysis of mobile agents for filtering data streams on wireless networks. MSWiM 2000: 85-94
1990 – 1999
- 1999
- [j13]Carl J. Beckmann, George Cybenko:
Computation in Communication. Computing in Science and Engineering 1(1): 22 (1999) - [j12]Carl J. Beckmann, Donald McManus, George Cybenko:
Horizons in scientific and distributed computing. Computing in Science and Engineering 1(1): 23-30 (1999) - 1998
- [c12]Robert S. Gray, David Kotz, George Cybenko, Daniela Rus:
D'Agents: Security in a Multiple-Language, Mobile-Agent System. Mobile Agents and Security 1998: 154-187 - [c11]Kenneth N. Ross, Ronald D. Chaney, George V. Cybenko, Daniel J. Burroughs, Alan S. Willsky:
Mobile agents in adaptive hierarchical Bayesian networks for global awareness. SMC 1998: 2207-2212 - 1997
- [j11]David Kotz
, Robert S. Gray, Saurab Nog, Daniela Rus, Sumit Chawla, George Cybenko:
AGENT TCL: Targeting the Needs of Mobile Computers. IEEE Internet Computing 1(4): 58-67 (1997) - [c10]George Cybenko:
High Performance Wireless Computing. ISHPC 1997: 71 - 1996
- [j10]George Cybenko:
Large-Scope Computing: The Industrial Challenges. ACM Comput. Surv. 28(4es): 21 (1996) - 1993
- [j9]George Cybenko:
Computation & Cognition (C. William Gear). SIAM Review 35(1): 147-148 (1993) - [j8]Sirpa Saarinen, Randall Bramley, George Cybenko:
Ill-Conditioning in Neural Network Training Problems. SIAM J. Scientific Computing 14(3): 693-714 (1993) - 1992
- [j7]George Cybenko:
Approximation by superpositions of a sigmoidal function. MCSS 5(4): 455 (1992) - [j6]David W. Krumme, George Cybenko, K. N. Venkataraman:
Gossiping in Minimal Time. SIAM J. Comput. 21(1): 111-139 (1992) - 1991
- [j5]Michael W. Berry
, George Cybenko, John L. Larson:
Scientific benchmark characterizations. Parallel Computing 17(10-11): 1173-1194 (1991) - [c9]David K. Bradley, George Cybenko, John L. Larson, F. Ahmad, J. Golab, Mark Straka:
Supercomputer workload decomposition and analysis. ICS 1991: 458-467 - [c8]Allan Tuchman, George Cybenko, David Jablonowski, Brian Bliss, Sanjay Sharma:
Vista: A System for Remote Data Visualization. PPSC 1991: 575-580 - [c7]Allan Tuchman, David Jablonowski, George Cybenko:
Run-Time Visualization of Program Data. IEEE Visualization 1991: 255-261 - 1990
- [c6]George Cybenko:
Complexity Theory of Neural Networks and Classification Problems. EURASIP Workshop 1990: 26-44 - [c5]George Cybenko, Lyle D. Kipp, Lynn Pointer, David J. Kuck:
Supercomputer performance evaluation and the Perfect Benchmarks. ICS 1990: 254-266
1980 – 1989
- 1989
- [j4]George Cybenko:
Dynamic Load Balancing for Distributed Memory Multiprocessors. J. Parallel Distrib. Comput. 7(2): 279-301 (1989) - [j3]George Cybenko:
Approximation by superpositions of a sigmoidal function. MCSS 2(4): 303-314 (1989) - 1988
- [j2]George Cybenko, T. G. Allen, J. E. Polito:
Practical parallel Union-Find algorithms for transitive closure and clustering. International Journal of Parallel Programming 17(5): 403-423 (1988) - 1987
- [j1]George Cybenko, David W. Krumme, K. N. Venkataraman:
Fixed Hypercube Embedding. Inf. Process. Lett. 25(1): 35-39 (1987) - [c4]David W. Krumme, George Cybenko, Alva L. Couch:
Instrumentation for distributed computing systems. FJCC 1987: 344 - [c3]George Cybenko, Tom Allen:
Recursive Binary Partitions-Abstract. PPSC 1987: 212 - 1986
- [c2]George Cybenko, David W. Krumme, K. N. Venkataraman:
Simultaneous Broadcasting in Multiprocessor Networks. ICPP 1986: 555-558
1970 – 1979
- 1979
- [c1]George Cybenko:
Round-off error propagation in Durbin's, Levinson's, and Trench's algorithms. ICASSP 1979: 498-501
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org and opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy.
Citation data
Add a list of citing articles from to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter accout. At the same time, Twitter will persitently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2019-11-29 21:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint