Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Search alternatives:
- Subject ("Data Exfiltration") »
Interactive Machine Learning for Data Exfiltration Detection: Active Learning with Human Expertise
Chung, Mu-Huan, Chignell, Mark, Wang, Lu, Jovicic, Alexandra, Raman, Abhay
Published in Conference proceedings - IEEE International Conference on Systems, Man, and Cybernetics (11.10.2020)
Published in Conference proceedings - IEEE International Conference on Systems, Man, and Cybernetics (11.10.2020)
Get full text
Conference Proceeding
Thwarting Data Exfiltration by Repackaged Applications
Andrade, Daniel, Kristoffersen, Thor, Rummelhoff, Ivar, Gerdov, Alex, Silva, Joao Nuno
Published in 2016 IEEE 35th Symposium on Reliable Distributed Systems Workshops (SRDSW) (01.09.2016)
Published in 2016 IEEE 35th Symposium on Reliable Distributed Systems Workshops (SRDSW) (01.09.2016)
Get full text
Conference Proceeding
Cyber Range for Research-Inspired Learning of "Attack Defense by Pretense" Principle and Practice
Vekaria, Komal Bhupendra, Calyam, Prasad, Wang, Songjie, Payyavula, Ramya, Rockey, Matthew, Ahmed, Nafis
Published in IEEE transactions on learning technologies (01.06.2021)
Published in IEEE transactions on learning technologies (01.06.2021)
Get full text
Journal Article
Guarding Against Malicious Biased Threats (GAMBiT) Experiments: Revealing Cognitive Bias in Human-Subjects Red-Team Cyber Range Operations
Beltz, Brandon, Doty, Jim, Fonken, Yvonne, Gurney, Nikolos, Israelsen, Brett, Lau, Nathan, Marsella, Stacy, Thomas, Rachelle, Trent, Stoney, Wu, Peggy, Yang, Ya-Ting, Zhu, Quanyan
Year of Publication 28.08.2025
Year of Publication 28.08.2025
Get full text
Journal Article