Author of the publication

Integrating Collaborative Cognitive Assistants Into Cybersecurity Operations Centers.

, , , and . AAAI Fall Symposium: ALEC, volume 2269 of CEUR Workshop Proceedings, page 28-35. CEUR-WS.org, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Innovative Application from the DARPA Knowledge Bases Programs: Rapid Development of a Course-of-Action Critiquer., , , and . AI Magazine, 22 (2): 43-62 (2001)Disciple-RKF/COG: Agent Teaching by Subject Matter Experts., , , , , , , and . AAAI/IAAI, page 992-993. AAAI Press / The MIT Press, (2002)User-Agent Interactions in Mixed-Initiative Learning., , and . FLAIRS, page 382-388. AAAI Press, (2001)Cognitive Assistants for Evidence-Based Reasoning Tasks., , , and . AAAI Fall Symposium: Advances in Cognitive Systems, volume FS-11-01 of AAAI Technical Report, AAAI, (2011)Rapid Argumentation Capture from Analysis Reports: The Case Study of Aum Shinrikyo., , and . STIDS, volume 966 of CEUR Workshop Proceedings, page 41-48. CEUR-WS.org, (2012)Integrating Collaborative Cognitive Assistants Into Cybersecurity Operations Centers., , , and . AAAI Fall Symposium: ALEC, volume 2269 of CEUR Workshop Proceedings, page 28-35. CEUR-WS.org, (2018)Disciple Cognitive Agents: Learning, Problem Solving Assistance, and Tutoring., , , and . BICA, volume 221 of Frontiers in Artificial Intelligence and Applications, page 169. IOS Press, (2010)Parallel Knowledge Base Development by Subject Matter Experts., , , , , and . EKAW, volume 3257 of Lecture Notes in Computer Science, page 265-279. Springer, (2004)Toward cognitive assistants for complex decision making under uncertainty., , , and . Intell. Decis. Technol., 8 (3): 231-250 (2014)Evidence-Based Detection of Advanced Persistent Threats., , , and . Comput. Sci. Eng., 20 (6): 54-65 (2018)