Fugate, Sunny
24  results:
Search for persons X
?
1

Using Natural Language Processing Tools to Infer Adversary ..:

, In: 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC),
Gabrys, Ryan ; Bilinski, Mark ; Fugate, Sunny. - p. 0541-0547 , 2024
 
?
2

Casino Rationale: Countering Attacker Deception in Zero-Sum..:

, In: Lecture Notes in Computer Science; Decision and Game Theory for Security,
Gabrys, Ryan ; Bilinski, Mark ; Mauger, Justin.. - p. 23-43 , 2023
 
?
3

No Time to Lie: Bounds on the Learning Rate of a Defender f..:

, In: Lecture Notes in Computer Science; Decision and Game Theory for Security,
 
?
4

How to swap instructions midstream : an embedding algori..:

, In: Proceedings of the 7th Symposium on Hot Topics in the Science of Security,
 
?
5

Lie Another Day: Demonstrating Bias in a Multi-round Cyber ..:

, In: Lecture Notes in Computer Science; Decision and Game Theory for Security,
 
?
6

Game theory for adaptive defensive cyber deception:

, In: Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security,
 
?
7

Creating Cyber Deception Games:

, In: 2019 IEEE First International Conference on Cognitive Machine Intelligence (CogMI),
Major, Maxine ; Fugate, Sunny ; Mauger, Justin. - p. 102-111 , 2019
 
?
8

Are Cyber Attackers Thinking Fast and Slow? Exploratory Ana..:

Gutzwiller, Robert S. ; Ferguson-Walter, Kimberly J. ; Fugate, Sunny J.
Proceedings of the Human Factors and Ergonomics Society Annual Meeting.  63 (2019)  1 - p. 427-431 , 2019
 
?
9

The World (of CTF) is Not Enough Data: Lessons Learned from..:

, In: 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC),
 
?
10

You only Lie Twice: A Multi-round Cyber Deception Game of Q..:

, In: Lecture Notes in Computer Science; Decision and Game Theory for Security,
 
?
11

"Oh, Look, A Butterfly!" A Framework For Distracting Attack..:

Gutzwiller, Robert ; Ferguson-Walter, Kimberly ; Fugate, Sunny.
Proceedings of the Human Factors and Ergonomics Society Annual Meeting.  62 (2018)  1 - p. 272-276 , 2018
 
?
12

Learning from super-mutants : searching post-apocalyptic..:

, In: Proceedings of the Genetic and Evolutionary Computation Conference Companion,
 
?
13

Proposing ambient visualization and pre-attentive processin..:

, In: Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust,
 
?
14

The Human Factors of Cyber Network Defense:

Gutzwiller, Robert S. ; Fugate, Sunny ; Sawyer, Benjamin D..
Proceedings of the Human Factors and Ergonomics Society Annual Meeting.  59 (2015)  1 - p. 322-326 , 2015
 
?
15

Removing the Kitchen Sink from Software:

, In: Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation,
 
1-15