![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/books/collections/JCSS2020.bht:"
@incollection{DBLP:books/sp/20/AlsalehA20, author = {Mohammed Noraden Alsaleh and Ehab Al{-}Shaer}, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {Automated Cyber Risk Mitigation: Making Informed Cost-Effective Decisions}, booktitle = {Adaptive Autonomous Secure Cyber Systems}, pages = {131--157}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1\_7}, doi = {10.1007/978-3-030-33432-1\_7}, timestamp = {Mon, 03 Jan 2022 21:52:41 +0100}, biburl = {https://dblp.org/rec/books/sp/20/AlsalehA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/GutierrezK20, author = {Marcus Gutierrez and Christopher Kiekintveld}, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {Online Learning Methods for Controlling Dynamic Cyber Deception Strategies}, booktitle = {Adaptive Autonomous Secure Cyber Systems}, pages = {231--251}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1\_11}, doi = {10.1007/978-3-030-33432-1\_11}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/20/GutierrezK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/HembergZO20, author = {Erik Hemberg and Linda Zhang and Una{-}May O'Reilly}, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense}, booktitle = {Adaptive Autonomous Secure Cyber Systems}, pages = {41--61}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1\_3}, doi = {10.1007/978-3-030-33432-1\_3}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/20/HembergZO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/HongK0PK20, author = {Jiwon Hong and Taeri Kim and Jing Liu and Noseong Park and Sang{-}Wook Kim}, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {Phishing {URL} Detection with Lexical Features and Blacklisted Domains}, booktitle = {Adaptive Autonomous Secure Cyber Systems}, pages = {253--267}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1\_12}, doi = {10.1007/978-3-030-33432-1\_12}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/20/HongK0PK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/HouWSLL20, author = {Tao Hou and Tao Wang and Dakun Shen and Zhuo Lu and Yao Liu}, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis}, booktitle = {Adaptive Autonomous Secure Cyber Systems}, pages = {109--129}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1\_6}, doi = {10.1007/978-3-030-33432-1\_6}, timestamp = {Fri, 28 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/20/HouWSLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/HuangZ20, author = {Linan Huang and Quanyan Zhu}, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense}, booktitle = {Adaptive Autonomous Secure Cyber Systems}, pages = {205--230}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1\_10}, doi = {10.1007/978-3-030-33432-1\_10}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/20/HuangZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/JiaG20, author = {Jinyuan Jia and Neil Zhenqiang Gong}, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {Defending Against Machine Learning Based Inference Attacks via Adversarial Examples: Opportunities and Challenges}, booktitle = {Adaptive Autonomous Secure Cyber Systems}, pages = {23--40}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1\_2}, doi = {10.1007/978-3-030-33432-1\_2}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/20/JiaG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/SchlenkerTXFTV20, author = {Aaron Schlenker and Omkar Thakoor and Haifeng Xu and Fei Fang and Milind Tambe and Phebe Vayanos}, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance}, booktitle = {Adaptive Autonomous Secure Cyber Systems}, pages = {183--204}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1\_9}, doi = {10.1007/978-3-030-33432-1\_9}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/20/SchlenkerTXFTV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/TheronKDRLPMG20, author = {Paul Th{\'{e}}ron and Alexander Kott and Martin Drasar and Krzysztof Rzadca and Beno{\^{\i}}t Leblanc and Mauno Pihelgas and Luigi V. Mancini and Fabio De Gaspari}, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems}, booktitle = {Adaptive Autonomous Secure Cyber Systems}, pages = {1--21}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1\_1}, doi = {10.1007/978-3-030-33432-1\_1}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/20/TheronKDRLPMG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/VenkatesanSYCC20, author = {Sridhar Venkatesan and Shridatt Sugrim and Jason A. Youzwak and Cho{-}Yu Jason Chiang and Ritu Chadha}, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {A Framework for Studying Autonomic Computing Models in Cyber Deception}, booktitle = {Adaptive Autonomous Secure Cyber Systems}, pages = {89--107}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1\_5}, doi = {10.1007/978-3-030-33432-1\_5}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/20/VenkatesanSYCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/VorobeychikP20, author = {Yevgeniy Vorobeychik and Michael Pritchard}, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {Plan Interdiction Games}, booktitle = {Adaptive Autonomous Secure Cyber Systems}, pages = {159--182}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1\_8}, doi = {10.1007/978-3-030-33432-1\_8}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/20/VorobeychikP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/Wang0BJ20, author = {Xinda Wang and Kun Sun and Archer L. Batcheller and Sushil Jajodia}, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {An Empirical Study of Secret Security Patch in Open Source Software}, booktitle = {Adaptive Autonomous Secure Cyber Systems}, pages = {269--289}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1\_13}, doi = {10.1007/978-3-030-33432-1\_13}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/20/Wang0BJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/ZhongYL20, author = {Chen Zhong and John Yen and Peng Liu}, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {Can Cyber Operations Be Made Autonomous? An Answer from the Situational Awareness Viewpoint}, booktitle = {Adaptive Autonomous Secure Cyber Systems}, pages = {63--88}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1\_4}, doi = {10.1007/978-3-030-33432-1\_4}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/20/ZhongYL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/20/JCSS2020, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {Adaptive Autonomous Secure Cyber Systems}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1}, doi = {10.1007/978-3-030-33432-1}, isbn = {978-3-030-33431-4}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/20/JCSS2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.