default search action
Search dblp for Publications
export results for "toc:db/series/lncs/lncs11830.bht:"
@incollection{DBLP:series/lncs/0003HXZEJ019, author = {Ping Chen and Zhisheng Hu and Jun Xu and Minghui Zhu and Rob Erbacher and Sushil Jajodia and Peng Liu}, editor = {Sushil Jajodia and George Cybenko and Peng Liu and Cliff Wang and Michael P. Wellman}, title = {{MTD} Techniques for Memory Protection Against Zero-Day Attacks}, booktitle = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security}, series = {Lecture Notes in Computer Science}, volume = {11830}, pages = {129--155}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30719-6\_7}, doi = {10.1007/978-3-030-30719-6\_7}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/0003HXZEJ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/AlbaneseCVC19, author = {Massimiliano Albanese and Warren Connell and Sridhar Venkatesan and George Cybenko}, editor = {Sushil Jajodia and George Cybenko and Peng Liu and Cliff Wang and Michael P. Wellman}, title = {Moving Target Defense Quantification}, booktitle = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security}, series = {Lecture Notes in Computer Science}, volume = {11830}, pages = {94--111}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30719-6\_5}, doi = {10.1007/978-3-030-30719-6\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/AlbaneseCVC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/AlbaneseJVCN19, author = {Massimiliano Albanese and Sushil Jajodia and Sridhar Venkatesan and George Cybenko and Thanh Hong Nguyen}, editor = {Sushil Jajodia and George Cybenko and Peng Liu and Cliff Wang and Michael P. Wellman}, title = {Adaptive Cyber Defenses for Botnet Detection and Mitigation}, booktitle = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security}, series = {Lecture Notes in Computer Science}, volume = {11830}, pages = {156--205}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30719-6\_8}, doi = {10.1007/978-3-030-30719-6\_8}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/AlbaneseJVCN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/CybenkoW0Z19, author = {George Cybenko and Michael P. Wellman and Peng Liu and Minghui Zhu}, editor = {Sushil Jajodia and George Cybenko and Peng Liu and Cliff Wang and Michael P. Wellman}, title = {Overview of Control and Game Theory in Adaptive Cyber Defenses}, booktitle = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security}, series = {Lecture Notes in Computer Science}, volume = {11830}, pages = {1--11}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30719-6\_1}, doi = {10.1007/978-3-030-30719-6\_1}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lncs/CybenkoW0Z19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/GanesanSJC19, author = {Rajesh Ganesan and Ankit Shah and Sushil Jajodia and Hasan Cam}, editor = {Sushil Jajodia and George Cybenko and Peng Liu and Cliff Wang and Michael P. Wellman}, title = {Optimizing Alert Data Management Processes at a Cyber Security Operations Center}, booktitle = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security}, series = {Lecture Notes in Computer Science}, volume = {11830}, pages = {206--231}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30719-6\_9}, doi = {10.1007/978-3-030-30719-6\_9}, timestamp = {Tue, 21 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lncs/GanesanSJC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/Hu0Z019, author = {Zhisheng Hu and Ping Chen and Minghui Zhu and Peng Liu}, editor = {Sushil Jajodia and George Cybenko and Peng Liu and Cliff Wang and Michael P. Wellman}, title = {Reinforcement Learning for Adaptive Cyber Defense Against Zero-Day Attacks}, booktitle = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security}, series = {Lecture Notes in Computer Science}, volume = {11830}, pages = {54--93}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30719-6\_4}, doi = {10.1007/978-3-030-30719-6\_4}, timestamp = {Thu, 19 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/Hu0Z019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/Miehling0T19, author = {Erik Miehling and Mohammad Rasouli and Demosthenis Teneketzis}, editor = {Sushil Jajodia and George Cybenko and Peng Liu and Cliff Wang and Michael P. Wellman}, title = {Control-Theoretic Approaches to Cyber-Security}, booktitle = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security}, series = {Lecture Notes in Computer Science}, volume = {11830}, pages = {12--28}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30719-6\_2}, doi = {10.1007/978-3-030-30719-6\_2}, timestamp = {Thu, 19 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/Miehling0T19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/PriestCSA019, author = {Benjamin W. Priest and George Cybenko and Satinder Singh and Massimiliano Albanese and Peng Liu}, editor = {Sushil Jajodia and George Cybenko and Peng Liu and Cliff Wang and Michael P. Wellman}, title = {Online and Scalable Adaptive Cyber Defense}, booktitle = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security}, series = {Lecture Notes in Computer Science}, volume = {11830}, pages = {232--261}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30719-6\_10}, doi = {10.1007/978-3-030-30719-6\_10}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/PriestCSA019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/TavafoghiOTW19, author = {Hamidreza Tavafoghi and Yi Ouyang and Demosthenis Teneketzis and Michael P. Wellman}, editor = {Sushil Jajodia and George Cybenko and Peng Liu and Cliff Wang and Michael P. Wellman}, title = {Game Theoretic Approaches to Cyber Security: Challenges, Results, and Open Problems}, booktitle = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security}, series = {Lecture Notes in Computer Science}, volume = {11830}, pages = {29--53}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30719-6\_3}, doi = {10.1007/978-3-030-30719-6\_3}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lncs/TavafoghiOTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/WellmanNW19, author = {Michael P. Wellman and Thanh Hong Nguyen and Mason Wright}, editor = {Sushil Jajodia and George Cybenko and Peng Liu and Cliff Wang and Michael P. Wellman}, title = {Empirical Game-Theoretic Methods for Adaptive Cyber-Defense}, booktitle = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security}, series = {Lecture Notes in Computer Science}, volume = {11830}, pages = {112--128}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30719-6\_6}, doi = {10.1007/978-3-030-30719-6\_6}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lncs/WellmanNW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/lncs/11830, editor = {Sushil Jajodia and George Cybenko and Peng Liu and Cliff Wang and Michael P. Wellman}, title = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security}, series = {Lecture Notes in Computer Science}, volume = {11830}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30719-6}, doi = {10.1007/978-3-030-30719-6}, isbn = {978-3-030-30718-9}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/11830.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.