Alexander Kott

Orcid: 0000-0003-1147-9726

According to our database1, Alexander Kott authored at least 82 papers between 1989 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


Online presence:



Human Intuition and Algorithmic Efficiency Must Be Balanced to Enhance Data Mesh Resilience.
Commun. ACM, May, 2024

Autonomous Intelligent Cyber-defense Agent: Introduction and Overview.
CoRR, 2023

Quantitative Measurement of Cyber Resilience: Modeling and Experimentation.
CoRR, 2023

Cyber Efficiency and Cyber Resilience.
Commun. ACM, 2023

Cyber Attacks Against Enterprise Networks: Characterization, Modeling and Forecasting.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

Toward Mission-Critical AI: Interpretable, Actionable, and Resilient AI.
Proceedings of the 15th International Conference on Cyber Conflict: Meeting Reality, 2023

Piecewise Linear and Stochastic Models for the Analysis of Cyber Resilience.
Proceedings of the 57th Annual Conference on Information Sciences and Systems, 2023

Autonomous Cyber Defense Introduces Risk: Can We Manage the Risk?
CoRR, 2022

Cybertrust: From Explainable to Actionable and Interpretable AI (AI2).
CoRR, 2022

Mathematical Modeling of Cyber Resilience.
Proceedings of the IEEE Military Communications Conference, 2022

An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience.
Proceedings of the IEEE Military Communications Conference, 2022

On games and simulators as a platform for development of artificial intelligence for command and control.
CoRR, 2021

How to Measure Cyber Resilience of an Autonomous Agent: Approaches and Challenges.
CoRR, 2021

Autonomous Cyberdefense Introduces Risk: Can We Manage the Risk?
Computer, 2021

To Improve Cyber Resilience, Measure It.
Computer, 2021

Cyber Resilience: by Design or by Intervention?
Computer, 2021

Doers, Not Watchers: Intelligent Autonomous Agents Are a Path to Cyber Resilience.
IEEE Secur. Priv., 2020

Cybertrust: From Explainable to Actionable and Interpretable Artificial Intelligence.
Computer, 2020

Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

Features and Operation of an Autonomous Agent for Cyber Defense.
CoRR, 2019

Intelligent Autonomous Things on the Battlefield.
CoRR, 2019

Statistical Models for the Number of Successful Cyber Intrusions.
CoRR, 2019

When Autonomous Intelligent Goodware Will Fight Autonomous Intelligent Malware: A Possible Future of Cyber Defense.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Intelligent Autonomous Agents are Key to Cyber Defense of the Future Army Networks.
CoRR, 2018

Game-Theoretic Model and Experimental Investigation of Cyber Wargaming.
CoRR, 2018

Long-Term Forecasts of Military Technologies for a 20-30 Year Horizon: An Empirical Assessment of Accuracy.
CoRR, 2018

Towards a Reconceptualisation of Cyber Risk: An Empirical and Ontological Study.
CoRR, 2018

Fundamental Concepts of Cyber Resilience: Introduction and Overview.
CoRR, 2018

Approaches to Enhancing Cyber Resilience: Report of the North Atlantic Treaty Organization (NATO) Workshop IST-153.
CoRR, 2018

Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG.
CoRR, 2018

Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense.
CoRR, 2018

Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture.
Proceedings of the International Conference on Military Communications and Information Systems, 2018

Challenges and Characteristics of Intelligent Autonomy for Internet of Battle Things in Highly Adversarial Environments.
Proceedings of the 2018 AAAI Spring Symposia, 2018

Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach.
IEEE Trans. Inf. Forensics Secur., 2017

Assessing Mission Impact of Cyberattacks: Toward a Model-Driven Paradigm.
IEEE Secur. Priv., 2017

Approaches to Modeling the Impact of Cyber Attacks on a Mission.
CoRR, 2017

Cyber-Physical War Gaming.
CoRR, 2017

Recommendations for Model-Driven Paradigms for Integrated Approaches to Cyber Defense.
CoRR, 2017

Overview of Cyber Science and Technology Programs at the U.S. Army Research Laboratory.
CoRR, 2017

How Do You Command an Army of Intelligent Things?
Computer, 2017

A Survey of Research on Control of Teams of Small Robots in Military Operations.
CoRR, 2016

Predicting Enemy's Actions Improves Commander Decision-Making.
CoRR, 2016

Assessing Mission Impact of Cyberattacks: Report of the NATO IST-128 Workshop.
CoRR, 2016

Approaches to Modeling Insurgency.
CoRR, 2016

Validation of Information Fusion.
CoRR, 2016

The Role of PMESII Modeling in a Continuous Cycle of Anticipation and Action.
CoRR, 2016

Decision Aids for Adversarial Planning in Military Operations: Algorithms, Tools, and Turing-test-like Experimental Validation.
CoRR, 2016

Resiliency and Robustness of Complex, Multi-Genre Networks.
CoRR, 2016

Inducing and Mitigating a Self-Reinforcing Degradation in Decision-making Teams.
CoRR, 2016

Coalition-based Planning of Military Operations: Adversarial Reasoning Algorithms in an Integrated Decision Aid.
CoRR, 2016

The Future Internet of Things and Security of its Control Systems.
CoRR, 2016

The Internet of Battle Things.
Computer, 2016

The Fog of War in Cyberspace.
Computer, 2016

Six Potential Game-Changers in Cyber Security: Towards Priorities in Cyber Science and Engineering.
CoRR, 2015

Toward a Research Agenda in Adversarial Reasoning: Computational Approaches to Anticipating the Opponent's Intent and Actions.
CoRR, 2015

An Experimental Evaluation of Computational Techniques for Planning and Assessment of International Interventions.
CoRR, 2015

Kinetic and Cyber.
CoRR, 2015

War of 2050: a Battle for Information, Communications, and Computer Security.
CoRR, 2015

Towards Approaches to Continuous Assessment of Cyber Risk in Security of Computer Networks.
CoRR, 2015

Science of Cyber Security as a System of Models and Problems.
CoRR, 2015

Security Metrics in Industrial Control Systems.
CoRR, 2015

Will Cybersecurity Dictate the Outcome of Future Wars?
Computer, 2015

Neuromorphic Computing for Cognitive Augmentation in Cyber Defense.
Proceedings of the Cybersecurity Systems for Human Cognition Augmentation, 2014

Concluding Thoughts.
Proceedings of the Cyber Defense and Situational Awareness, 2014

Proceedings of the Cyber Defense and Situational Awareness, 2014

Kinetic and Cyber.
Proceedings of the Cyber Defense and Situational Awareness, 2014

Towards Fundamental Science of Cyber Security.
Proceedings of the Network Science and Cybersecurity, 2014

Security Outlook: Six Cyber Game Changers for the Next 15 Years.
Computer, 2014

Resiliency and Robustness of Complex Systems and Networks.
Proceedings of the Adaptive, Dynamic, and Resilient Systems., 2014

The Promises and Challenges of Continuous Monitoring and Risk Scoring.
IEEE Secur. Priv., 2013

Hypothesis-driven information fusion in adversarial, deceptive environments.
Inf. Fusion, 2011

Approaches to validation of information fusion systems.
Proceedings of the 12th International Conference on Information Fusion, 2009

Building a Tool for Battle Planning: Challenges, Tradeoffs, and Experimental Findings.
Appl. Intell., 2005

Incorporating AI into Military Decision Making: An Experiment.
IEEE Intell. Syst., 2003

AI on the Battlefield: An Experimental Exploration.
Proceedings of the Eighteenth National Conference on Artificial Intelligence and Fourteenth Conference on Innovative Applications of Artificial Intelligence, July 28, 2002

Toward Practical Knowledge-Based Tools for Battle Planning and Scheduling.
Proceedings of the Eighteenth National Conference on Artificial Intelligence and Fourteenth Conference on Innovative Applications of Artificial Intelligence, July 28, 2002

Instability of distributed decision making in in command and control systems.
Proceedings of the American Control Conference, 2001

A New Technique Enables Dynamic Replanning and Rescheduling of Aeromedical Evacuation.
AI Mag., 1999

Distributed Medical Evacuation Planning: What Problem Should Each Agent Solve?
Proceedings of the Constraints & Agents: Collected Papers from the 1997 AAAI Workshop, 1997

Resource Configuration and Allocation-A Case Study of Constrained Heuristic Search.
IEEE Expert, 1992

Feature-Based Design for Manufacturability Critique in Concurrent Engineering.
Proceedings of the Computer-Aided Cooperative Product Development, MIT-JSME Workshop, 1989