Author of the publication

Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain.

, , , , , , , , , , and . ICMLA, page 1350-1357. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lateral Movement Detection Using User Behavioral Analysis., , , , , , , , , and 2 other author(s). CoRR, (2022)Foundational Models for Malware Embeddings Using Spatio-Temporal Parallel Convolutional Networks., , , , , , , , and . CoRR, (2023)Zero Day Threat Detection Using Metric Learning Autoencoders., , , , , , , , , and . ICMLA, page 1318-1325. IEEE, (2022)FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks., , , , , and . CCWC, page 28-35. IEEE, (2024)Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain., , , , , , , , , and 1 other author(s). ICMLA, page 1350-1357. IEEE, (2022)Enhancing Exfiltration Path Analysis Using Reinforcement Learning., , , , , , , , , and . CoRR, (2023)Anomaly Detection via Federated Learning., , , , , , , , , and 2 other author(s). ITNAC, page 259-266. IEEE, (2023)Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs., , , , , , , , , and . DSC, page 1-8. IEEE, (2022)Crown Jewels Analysis using Reinforcement Learning with Attack Graphs., , , , , and . SSCI, page 1-6. IEEE, (2021)Using Cyber Terrain in Reinforcement Learning for Penetration Testing., , , , , , , and . COINS, page 1-8. IEEE, (2022)