Zobrazeno 1 - 10
of 32
pro vyhledávání: '"William W. Streilein"'
Autor:
Joseph C. Osborn, Nicholas Mattei, Martin Michalowski, Reuth Mirsky, Bruno Bouchard, William W. Streilein, Sarah Keren, Kokil Jaidka, Amit Sheth, David R. Martinez, Ilan Shimshoni, Arunesh Sinha, Howie Shrobe, Amelie Gyrard, K. Brent Venable, Atanu R. Sinha, Anna Zamansky, Eitan Farchi, Georgios Theocharous, Roni Khardon, Sébastien Gaboury, Noam Brown, Onn Shehory, Arash Shaban-Nejad, Kevin Bouchard, Biplav Srivastava, Neal Wagner, Parisa Kordjamshidi, Christopher W. Geib, Niyati Chhaya, Cem Safak Sahin
Publikováno v:
AI Magazine; Vol 39 No 4: Winter 2018; 45-56
The AAAI-18 workshop program included 15 workshops covering a wide range of topics in AI. Workshops were held Sunday and Monday, February 2–7, 2018, at the Hilton New Orleans Riverside in New Orleans, Louisiana, USA. This report contains summaries
Publikováno v:
EAI/Springer Innovations in Communication and Computing ISBN: 9783030193522
A model of strategy formulation is used to study how an adaptive attacker learns to overcome a moving target cyber defense. The attacker-defender interaction is modeled as a game in which a defender deploys a temporal platform migration defense. Agai
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::52223845822b2ef9eb6517e36a8cc458
https://doi.org/10.1007/978-3-030-19353-9_1
https://doi.org/10.1007/978-3-030-19353-9_1
Autor:
Jaime Pena, M. L. Winterrose, Neal Wagner, James F. Riordan, Cem Safak Sahin, Diana Hanson, William W. Streilein
Publikováno v:
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology. 14:201-216
Modern missions of government and private organizations rely on computer networks to operate. As evidenced by several well-publicized cyber breaches, these missions are under attack. Several cyber defensive measures have been proposed to mitigate thi
Publikováno v:
Advances in Nature-Inspired Computing and Applications ISBN: 9783319964508
Network segmentation refers to the practice of partitioning a computer network into multiple segments and restricting communications between segments to inhibit a cyberattacker’s ability to move and spread infection. While segmentation is widely re
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0d319a9dc5cd58e8445f66014ac837e7
https://doi.org/10.1007/978-3-319-96451-5_1
https://doi.org/10.1007/978-3-319-96451-5_1
Publikováno v:
SSCI
Cyber security experts have recommended splitting a computer network into multiple segments to limit the damage that an attacker can cause after penetrating the network. However, there is no clear guidance on what segmentation architectures are best
Autor:
Thanh H. Nguyen, Reuth Mirsky, Sarah Keren, Maria Gini, Aaron Isaksen, William W. Streilein, Arash Shaban-Nejad, Christopher W. Geib, Rodney Martin, Michael Thielscher, Roman Barták, Monica Anderson, Shirin Sohrabi, Byron C. Wallace, Julian Togelius, Arunesh Sinha, Jichen Zhu, Mark J. Stefik, Scott Sanner, Szymon Wilk, So Cao Tran, David L. Buckeridge, Michael J. Paul, Hoda Eldardiry, David R. Martinez, Nathan R. Sturtevant, Martin Michalowski, John S. Brownstein, Kumar Sricharan, Long Tran-Thanh, Viliam Lisy, Loizos Michael, Enrico Pontelli, Neal Wagner, Robert Laddaga, Biplav Srivastava, Kartik Talamadupula
Publikováno v:
AI Magazine; Vol 38 No 3: Fall 2017; 72-82
The AAAI-17 workshop program included 17 workshops covering a wide range of topics in AI. Workshops were held Sunday and Monday, February 4-5, 2017 at the Hilton San Francisco Union Square in San Francisco, California, USA. This report contains summa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::90c9bbdcfac0a3415c9cd72fd1db71f2
http://aaai.org/ojs/index.php/aimagazine/article/view/2755
http://aaai.org/ojs/index.php/aimagazine/article/view/2755
Publikováno v:
IEEE Transactions on Information Forensics and Security. 9:1394-1405
Techniques for network security analysis have historically focused on the actions of the network hosts. Outside of forensic analysis, little has been done to detect or predict malicious or infected nodes strictly based on their association with other
Publikováno v:
IEEE Security & Privacy. 12:16-26
Protecting critical systems and assets against cyberattacks is an ever more difficult challenge that strongly favors attackers. Whereas defenders must protect a large, diverse set of cybersystems containing an unknown number of vulnerabilities of var
Autor:
Jaime Pena, Diana Hanson, James F. Riordan, Cem Safak Sahin, William W. Streilein, M. L. Winterrose, Neal Wagner
Publikováno v:
SSCI
Network segmentation is a security measure that partitions a network into sections or segments to restrict the movement of a cyber attacker and make it difficult for her to gain access to valuable network resources. This threat-mitigating practice ha
Publikováno v:
DSN
In cyber security, achieving the desired balance between system security and system performance in dynamic threat environments is a long-standing open challenge for cyber defenders. Typically an increase in system security comes at the price of decre