Author:
Jha S.,Sheyner O.,Wing J.
Cited by
236 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Game Theoretic Framework for Multi Domain Cyber Deception;2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2024-07-08
2. Lessons learned in designing a cyber reinforcement learning competition;Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications VI;2024-06-07
3. Threat modelling in Internet of Things (IoT) environments using dynamic attack graphs;Frontiers in the Internet of Things;2024-05-30
4. Jbeil: Temporal Graph-Based Inductive Learning to Infer Lateral Movement in Evolving Enterprise Networks;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
5. Assessing the Health of a Network Under Attack;2024 12th International Symposium on Digital Forensics and Security (ISDFS);2024-04-29