Personensuche
X
?
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining ,
1
The 3rd Workshop on Artificial Intelligence-enabled Cyberse..:
, In:
?
Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining ,
2
ACM KDD AI4Cyber/MLHat: Workshop on AI-enabled Cybersecurit..:
, In:
?
2022 International Conference on Computer Communications and Networks (ICCCN) ,
3
Discovery of Rare yet Co-occurring Actions with Temporal Ch..:
, In:
?
Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining ,
4
ACM KDD AI4Cyber: The 1st Workshop on Artificial Intelligen..:
, In:
?
2020 IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications (DS-RT) ,
5
Session-level Adversary Intent-Driven Cyberattack Simulator:
, In:
?
Proceedings of the IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications ,
6
Session-level adversary intent-driven cyberattack simulator:
, In:
?
Proceedings of the Sixth International Workshop on Security and Privacy Analytics ,
7
Dissecting Cyberadversarial Intrusion Stages via Interdisci..:
, In:
?
Proceedings of the 12th Annual Conference on Cyber and Information Security Research ,
9
Time series forecasting of cyber attack intensity:
, In:
?
Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks ,
11
Energy efficient data retrieval for networked multi-mode wi..:
, In:
?
Computer Security. ESORICS 2023 International Workshops; Lecture Notes in Computer Science ,
12
The Road Towards Autonomous Cybersecurity Agents: Remedies ..:
, In:
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Digital Forensics and Cyber Crime ,
13
Unraveling Network-Based Pivoting Maneuvers: Empirical Insi..:
, In:
?
Advances in Information Security; Autonomous Intelligent Cyber Defense Agent (AICA) ,
14
Learning About the Adversary:
, In:
?
2023 IEEE Conference on Communications and Network Security (CNS) ,
15