Author of the publication

Active Perception for Cyber Intrusion Detection and Defense.

, , , , , , , and . AAAI Workshop: Artificial Intelligence for Cyber Security, volume WS-16-03 of AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Active Perception for Cyber Intrusion Detection and Defense., , , , , , , and . AAAI Workshop: Artificial Intelligence for Cyber Security, volume WS-16-03 of AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.Qualitative Reasoning about Cyber Intrusions., , , , and . AAAI Workshops, volume WS-17 of AAAI Technical Report, AAAI Press, (2017)A Model of Learning by Incremental Analogical Reasoning and Debugging.. AAAI, page 45-48. AAAI Press, (1983)FUZZBUSTER: Towards Adaptive Immunity from Cyber Threats., , , , , and . SASO Workshops, page 137-140. IEEE Computer Society, (2011)The Role of Object Primitives in Natural Language Processing., and . IJCAI, page 522-524. William Kaufmann, (1979)A SILK Graphical UI for Defeasible Reasoning, with a Biology Causal Process Example., , , , , , , and . RuleML Challenge, volume 649 of CEUR Workshop Proceedings, CEUR-WS.org, (2010)Trust and Adaptation in STRATUS., , and . TrustCom/ISPA/IUCC, page 1711-1716. IEEE Computer Society, (2013)An Approach to Mixed-Initiative Management of Heterogeneous Software Agent Teams., , and . HICSS, IEEE Computer Society, (1999)POIROT - Integrated Learning of Web Service Procedures., , , , , , , , and . AAAI, page 1274-1279. AAAI Press, (2008)Comparing Strategic and Tactical Responses to Cyber Threats., , , , , and . SASO Workshops, page 35-40. IEEE Computer Society, (2013)