Brett Benyo

Orcid: 0000-0003-0117-0645

According to our database1, Brett Benyo authored at least 25 papers between 1999 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


Online presence:



Dynamic Explanation of Bayesian Networks with Abductive Bayes Factor Qualitative Propagation and Entropy-Based Qualitative Explanation.
Proceedings of the 24th IEEE International Conference on Information Fusion, 2021

An Event-based Data Model for Granular Information Flow Tracking.
Proceedings of the 12th International Workshop on Theory and Practice of Provenance, 2020

Semantic Links Across Distributed Heterogeneous Data.
Proceedings of the Distributed Computing and Artificial Intelligence, 2019

HYDRA: Hypothesis Driven Repair Automation.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Managed Execution Environment as a Moving-Target Defense Infrastructure.
IEEE Secur. Priv., 2014

Understanding Rulelog Computations in Silk.
CoRR, 2013

On the Evaluation of Space-Time Functions.
Comput. J., 2013

Automated Self-Adaptation for Cyber-Defense - Pushing Adaptive Perimeter Protection Inward.
Proceedings of the 7th IEEE International Conference on Self-Adaptation and Self-Organizing Systems Workshops, 2013

Advanced Knowledge Base Debugging for Rulelog.
Proceedings of the Joint Proceedings of the 7th International Rule Challenge, 2013

Leveraging Historical Experience to Evaluate and Adapt Courses of Action.
Proceedings of the Case-Based Reasoning Research and Development, 2013

Moving target defense (MTD) in an adaptive execution environment.
Proceedings of the Cyber Security and Information Intelligence, 2013

Temporal Milestones in HTNs.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013

Isolation of Malicious External Inputs in a Security Focused Adaptive Execution Environment.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

A3: An Environment for Self-Adaptive Diagnosis and Immunization of Novel Attacks.
Proceedings of the Sixth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2012

Transparent Insertion of Custom Logic in HTTP(S) Streams Using PbProxy.
IEEE Internet Comput., 2011

A SILK Graphical UI for Defeasible Reasoning, with a Biology Causal Process Example.
Proceedings of the ISWC 2010 Posters & Demonstrations Track: Collected Abstracts, 2010

POIROT - Integrated Learning of Web Service Procedures.
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008

Expectation Failure as a Basis for Agent-Based Model Diagnosis and Mixed Initiative Model Adaptation during Anomalous Plan Execution.
Proceedings of the IJCAI 2007, 2007

DAML-Based Policy Enforcement for Semantic Data Transformation and Filtering in Multi-agent Systems.
Proceedings of the Multi-Agent Systems and Applications III, 2003

Toward DAML-based policy enforcement for semantic data transformation and filtering in multi-agent systems.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003

Representation and reasoning for DAML-based policy and domain services in KAoS and nomads.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003

Using self-diagnosis to adapt organizational structures.
Proceedings of the Fifth International Conference on Autonomous Agents, 2001

Investigating Interactions between Agent Conversations and Agent Control Components.
Proceedings of the Issues in Agent Communication, 2000

The UMASS Intelligent Home Project.
Proceedings of the Third Annual Conference on Autonomous Agents, 1999