Author of the publication

Optimizing Alert Data Management Processes at a Cyber Security Operations Center.

, , , and . Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, volume 11830 of Lecture Notes in Computer Science, Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Optimal Defect Detection in Assembled Printed Circuit Boards Under Adverse Conditions., , , and . IEEE Access, (2023)Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System., , , , and . ACM Trans. Intell. Syst. Technol., 11 (3): 32:1-32:20 (2020)LoFT: Local Proxy Fine-tuning For Improving Transferability Of Adversarial Attacks Against Large Language Model., , , , , , , , , and 3 other author(s). CoRR, (2023)Feature extraction and evaluation for BioMedical Question Answering., , and . CoRR, (2021)Understanding and Mitigating the Label Noise in Pre-training on Downstream Tasks., , , , , , , and . CoRR, (2023)Importance of negative sampling in weak label learning., , , , and . CoRR, (2023)Learning Sound Events From Webly Labeled Data., , , and . CoRR, (2018)Plug in the Safety Chip: Enforcing Constraints for LLM-driven Robot Agents., , , and . CoRR, (2023)A Closer Look at Weak Label Learning for Audio Events., , , and . CoRR, (2018)Optimal Assignment of Sensors to Analysts in a Cybersecurity Operations Center., , , and . IEEE Syst. J., 13 (1): 1060-1071 (2019)