Search dblp for Publications

export results for "toc:db/books/collections/JCSS2020.bht:"

 download as .bib file

@incollection{DBLP:books/sp/20/AlsalehA20,
  author       = {Mohammed Noraden Alsaleh and
                  Ehab Al{-}Shaer},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Automated Cyber Risk Mitigation: Making Informed Cost-Effective Decisions},
  booktitle    = {Adaptive Autonomous Secure Cyber Systems},
  pages        = {131--157},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1\_7},
  doi          = {10.1007/978-3-030-33432-1\_7},
  timestamp    = {Mon, 03 Jan 2022 21:52:41 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/AlsalehA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/GutierrezK20,
  author       = {Marcus Gutierrez and
                  Christopher Kiekintveld},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Online Learning Methods for Controlling Dynamic Cyber Deception Strategies},
  booktitle    = {Adaptive Autonomous Secure Cyber Systems},
  pages        = {231--251},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1\_11},
  doi          = {10.1007/978-3-030-33432-1\_11},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/GutierrezK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/HembergZO20,
  author       = {Erik Hemberg and
                  Linda Zhang and
                  Una{-}May O'Reilly},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Exploring Adversarial Artificial Intelligence for Autonomous Adaptive
                  Cyber Defense},
  booktitle    = {Adaptive Autonomous Secure Cyber Systems},
  pages        = {41--61},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1\_3},
  doi          = {10.1007/978-3-030-33432-1\_3},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/20/HembergZO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/HongK0PK20,
  author       = {Jiwon Hong and
                  Taeri Kim and
                  Jing Liu and
                  Noseong Park and
                  Sang{-}Wook Kim},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Phishing {URL} Detection with Lexical Features and Blacklisted Domains},
  booktitle    = {Adaptive Autonomous Secure Cyber Systems},
  pages        = {253--267},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1\_12},
  doi          = {10.1007/978-3-030-33432-1\_12},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/HongK0PK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/HouWSLL20,
  author       = {Tao Hou and
                  Tao Wang and
                  Dakun Shen and
                  Zhuo Lu and
                  Yao Liu},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Autonomous Security Mechanisms for High-Performance Computing Systems:
                  Review and Analysis},
  booktitle    = {Adaptive Autonomous Secure Cyber Systems},
  pages        = {109--129},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1\_6},
  doi          = {10.1007/978-3-030-33432-1\_6},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/HouWSLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/HuangZ20,
  author       = {Linan Huang and
                  Quanyan Zhu},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense},
  booktitle    = {Adaptive Autonomous Secure Cyber Systems},
  pages        = {205--230},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1\_10},
  doi          = {10.1007/978-3-030-33432-1\_10},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/HuangZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/JiaG20,
  author       = {Jinyuan Jia and
                  Neil Zhenqiang Gong},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Defending Against Machine Learning Based Inference Attacks via Adversarial
                  Examples: Opportunities and Challenges},
  booktitle    = {Adaptive Autonomous Secure Cyber Systems},
  pages        = {23--40},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1\_2},
  doi          = {10.1007/978-3-030-33432-1\_2},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/JiaG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/SchlenkerTXFTV20,
  author       = {Aaron Schlenker and
                  Omkar Thakoor and
                  Haifeng Xu and
                  Fei Fang and
                  Milind Tambe and
                  Phebe Vayanos},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance},
  booktitle    = {Adaptive Autonomous Secure Cyber Systems},
  pages        = {183--204},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1\_9},
  doi          = {10.1007/978-3-030-33432-1\_9},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/SchlenkerTXFTV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/TheronKDRLPMG20,
  author       = {Paul Th{\'{e}}ron and
                  Alexander Kott and
                  Martin Drasar and
                  Krzysztof Rzadca and
                  Beno{\^{\i}}t Leblanc and
                  Mauno Pihelgas and
                  Luigi V. Mancini and
                  Fabio De Gaspari},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Reference Architecture of an Autonomous Agent for Cyber Defense of
                  Complex Military Systems},
  booktitle    = {Adaptive Autonomous Secure Cyber Systems},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1\_1},
  doi          = {10.1007/978-3-030-33432-1\_1},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/TheronKDRLPMG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/VenkatesanSYCC20,
  author       = {Sridhar Venkatesan and
                  Shridatt Sugrim and
                  Jason A. Youzwak and
                  Cho{-}Yu Jason Chiang and
                  Ritu Chadha},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {A Framework for Studying Autonomic Computing Models in Cyber Deception},
  booktitle    = {Adaptive Autonomous Secure Cyber Systems},
  pages        = {89--107},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1\_5},
  doi          = {10.1007/978-3-030-33432-1\_5},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/VenkatesanSYCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/VorobeychikP20,
  author       = {Yevgeniy Vorobeychik and
                  Michael Pritchard},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Plan Interdiction Games},
  booktitle    = {Adaptive Autonomous Secure Cyber Systems},
  pages        = {159--182},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1\_8},
  doi          = {10.1007/978-3-030-33432-1\_8},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/VorobeychikP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/Wang0BJ20,
  author       = {Xinda Wang and
                  Kun Sun and
                  Archer L. Batcheller and
                  Sushil Jajodia},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {An Empirical Study of Secret Security Patch in Open Source Software},
  booktitle    = {Adaptive Autonomous Secure Cyber Systems},
  pages        = {269--289},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1\_13},
  doi          = {10.1007/978-3-030-33432-1\_13},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/Wang0BJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/ZhongYL20,
  author       = {Chen Zhong and
                  John Yen and
                  Peng Liu},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Can Cyber Operations Be Made Autonomous? An Answer from the Situational
                  Awareness Viewpoint},
  booktitle    = {Adaptive Autonomous Secure Cyber Systems},
  pages        = {63--88},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1\_4},
  doi          = {10.1007/978-3-030-33432-1\_4},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/20/ZhongYL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/20/JCSS2020,
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Adaptive Autonomous Secure Cyber Systems},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1},
  doi          = {10.1007/978-3-030-33432-1},
  isbn         = {978-3-030-33431-4},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/JCSS2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics