Author of the publication

Risk Prioritization by Leveraging Latent Vulnerability Features in a Contested Environment.

, , , , and . AISec@CCS, page 49-57. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber Baselining: Statistical properties of cyber time series and the search for stability., , , and . HPEC, page 1-7. IEEE, (2019)Automated Business Process Discovery from Unstructured Natural-Language Documents., , , , , , , , , and . Business Process Management Workshops, volume 397 of Lecture Notes in Business Information Processing, page 232-243. Springer, (2020)Developing a Series of AI Challenges for the United States Department of the Air Force., , , , , , , , , and 32 other author(s). CoRR, (2022)Risk Prioritization by Leveraging Latent Vulnerability Features in a Contested Environment., , , , and . AISec@CCS, page 49-57. ACM, (2019)PunyVis: A Visual Analytics Approach for Identifying Homograph Phishing Attacks., , , and . VizSEC, page 1-10. IEEE, (2019)Latent feature vulnerability ranking of CVSS vectors., , and . SummerSim, page 19:1-19:12. Society for Computer Simulation International / ACM DL, (2017)Enabling high-fidelity neutron transport simulations on petascale architectures., , , , , and . SC, ACM, (2009)Corrected implicit Monte Carlo., and . J. Comput. Phys., (2018)Extensible Machine Learning for Encrypted Network Traffic Application Labeling via Uncertainty Quantification., , , , , , , , and . CoRR, (2022)Extensible Machine Learning for Encrypted Network Traffic Application Labeling via Uncertainty Quantification., , , , , , , , and . IEEE Trans. Artif. Intell., 5 (1): 420-433 (January 2024)