George Cybenko

According to our database1, George Cybenko authored at least 96 papers between 1979 and 2020.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2000, "For contributions to algorithms and theory of artificial neural networks in signal processing, and to theory and systems software for distributed and parallel computing.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Observability Properties of Colored Graphs.
IEEE Trans. Netw. Sci. Eng., 2020

A Survey of Neural Networks and Formal Languages.
CoRR, 2020

Analytic Properties of Trackable Weak Models.
CoRR, 2020

2019
Online and Scalable Adaptive Cyber Defense.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

Overview of Control and Game Theory in Adaptive Cyber Defenses.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

Adaptive Cyber Defenses for Botnet Detection and Mitigation.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

Moving Target Defense Quantification.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

Analytics for directed contact networks.
Appl. Netw. Sci., 2019

Graph Models in Tracking Behaviors for Cyber-Security.
Proceedings of the Graphical Models for Security - 6th International Workshop, 2019

2018
VULCON: A System for Vulnerability Prioritization, Mitigation, and Management.
ACM Trans. Priv. Secur., 2018

AI and Fake News.
IEEE Intell. Syst., 2018

Control Flow Graph Modifications for Improved RF-Based Processor Tracking Performance.
CoRR, 2018

Asymptotic Behavior of Attack Graph Games.
Proceedings of the From Database to Cyber Security, 2018

2017
Parallel Computing for Machine Learning in Social Network Analysis.
Proceedings of the 2017 IEEE International Parallel and Distributed Processing Symposium Workshops, 2017

2016
ParSocial 2016 Keynote.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

A Moving Target Defense Approach to Disrupting Stealthy Botnets.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

Quantifying Covertness in Deceptive Cyber Operations.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Identifying and Exploiting the Cyber High Ground for Botnets.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015

Deep Learning of Behaviors for Security.
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015

Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students.
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015

MTD 2015: Second ACM Workshop on Moving Target Defense.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Inaugural Issue Editorial.
IEEE Trans. Comput. Soc. Syst., 2014

IEEE Security & Privacy: The Early Years.
IEEE Secur. Priv., 2014

Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation.
Proceedings of the Information Systems Security - 10th International Conference, 2014

No free lunch in cyber security.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

2013
Adversarial Dynamics: The Conficker Case Study.
Proceedings of the Moving Target Defense II, 2013

Engineering Statistical Behaviors for Attacking and Defending Covert Channels.
IEEE J. Sel. Top. Signal Process., 2013

2012
Security Analytics and Measurements.
IEEE Secur. Priv., 2012

Managing Malicious Insider Risk through BANDIT.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Learning Hidden Markov Models Using Nonnegative Matrix Factorization.
IEEE Trans. Inf. Theory, 2011

Attacking and Defending Covert Channels and Behavioral Models
CoRR, 2011

Exploiting Adversary's Risk Profiles in Imperfect Information Security Games.
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011

2010
Discovering Influence in Communication Networks Using Dynamic Graph Analysis.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

2009
A Language of Life: Characterizing People Using Cell Phone Tracks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Process learning of network interactions in market microstructures.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Financial Engineering, 2009

2008
The theory of trackability with applications to sensor networks.
ACM Trans. Sens. Networks, 2008

Learning Hidden Markov Models using Non-Negative Matrix Factorization
CoRR, 2008

Cybersecurity Strategies: The QuERIES Methodology.
Computer, 2008

2007
Guest Editors' Introduction: Security & Privacy.
IEEE Pervasive Comput., 2007

Process Query Systems.
Computer, 2007

2006
Semantic Interoperability and Information Fluidity.
Int. J. Cooperative Inf. Syst., 2006

Weak Links, Strong Ties.
IEEE Secur. Priv., 2006

Why Johnny Can't Evaluate Security Risk.
IEEE Secur. Priv., 2006

Practical Autonomic Computing.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

2005
Efficient computation of the hidden Markov model entropy for a given observation sequence.
IEEE Trans. Inf. Theory, 2005

The One-Eyed Man Is King.
IEEE Secur. Priv., 2005

Homeland Security.
IEEE Intell. Syst., 2005

Distance measures for nonparametric weak process models.
Proceedings of the IEEE International Conference on Systems, 2005

Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems.
Proceedings of the Second International Conference on Autonomic Computing (ICAC 2005), 2005

2004
Cognitive Hacking.
Proceedings of the Economics of Information Security, 2004

Security Alchemy.
IEEE Secur. Priv., 2004

From the Editors: Don't Bring a Knife to a Gunfight.
IEEE Secur. Priv., 2004

Cognitive Hacking.
Adv. Comput., 2004

Functional Validation in Grid Computing.
Auton. Agents Multi Agent Syst., 2004

2003
From the Editors: Privacy Is the Issue.
IEEE Secur. Priv., 2003

Boiling Frogs?
IEEE Secur. Priv., 2003

From the Editor: Sapphire/Slammer Redux.
IEEE Secur. Priv., 2003

A Critical Need, An Ambitious Mission, A New Magazine.
IEEE Secur. Priv., 2003

Semantic depth and markup complexity.
Proceedings of the IEEE International Conference on Systems, 2003

Tracking a moving object with a binary sensor network.
Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003

2002
A fuzzy MHT algorithm applied to text-based information tracking.
IEEE Trans. Fuzzy Syst., 2002

D'Agents: Applications and performance of a mobile-agent system.
Softw. Pract. Exp., 2002

Performance Analysis of Mobile Agents for Filtering Data Streams on Wireless Networks.
Mob. Networks Appl., 2002

Understanding Quantum Computing [Book Review].
Comput. Sci. Eng., 2002

Cognitive Hacking: A Battle for the Mind.
Computer, 2002

2001
The Traveling Agent Problem.
Math. Control. Signals Syst., 2001

Machine learning [Book Review].
Comput. Sci. Eng., 2001

Reducing quantum computations to elementary unitary operations.
Comput. Sci. Eng., 2001

2000
Keeping Up with the Changing Web.
Computer, 2000

How dynamic is the Web?
Comput. Networks, 2000

Performance analysis of mobile agents for filtering data streams on wireless networks.
Proceedings of the 3rd International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2000

1999
Tracking with text-based messages.
IEEE Intell. Syst., 1999

Horizons in scientific and distributed computing.
Comput. Sci. Eng., 1999

Computation in Communication.
Comput. Sci. Eng., 1999

1998
Mobile agents in adaptive hierarchical Bayesian networks for global awareness.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 1998

D'Agents: Security in a Multiple-Language, Mobile-Agent System.
Proceedings of the Mobile Agents and Security, 1998

1997
AGENT TCL: Targeting the Needs of Mobile Computers.
IEEE Internet Comput., 1997

High Performance Wireless Computing.
Proceedings of the High Performance Computing, International Symposium, 1997

1996
Large-Scope Computing: The Industrial Challenges.
ACM Comput. Surv., 1996

1993
Ill-Conditioning in Neural Network Training Problems.
SIAM J. Sci. Comput., 1993

Computation & Cognition (C. William Gear).
SIAM Rev., 1993

1992
Gossiping in Minimal Time.
SIAM J. Comput., 1992

Approximation by superpositions of a sigmoidal function.
Math. Control. Signals Syst., 1992

1991
Scientific benchmark characterizations.
Parallel Comput., 1991

Run-Time Visualization of Program Data.
Proceedings of the 2nd IEEE Visualization Conference, 1991

Vista: A System for Remote Data Visualization.
Proceedings of the Fifth SIAM Conference on Parallel Processing for Scientific Computing, 1991

Supercomputer workload decomposition and analysis.
Proceedings of the 5th international conference on Supercomputing, 1991

1990
Supercomputer performance evaluation and the Perfect Benchmarks.
Proceedings of the 4th international conference on Supercomputing, 1990

Complexity Theory of Neural Networks and Classification Problems.
Proceedings of the Neural Networks, 1990

1989
Dynamic Load Balancing for Distributed Memory Multiprocessors.
J. Parallel Distributed Comput., 1989

1988
Practical parallel Union-Find algorithms for transitive closure and clustering.
Int. J. Parallel Program., 1988

1987
Fixed Hypercube Embedding.
Inf. Process. Lett., 1987

Recursive Binary Partitions-Abstract.
Proceedings of the Third SIAM Conference on Parallel Processing for Scientific Computing, 1987

Instrumentation for distributed computing systems.
Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow, 1987

1986
Simultaneous Broadcasting in Multiprocessor Networks.
Proceedings of the International Conference on Parallel Processing, 1986

1979
Round-off error propagation in Durbin's, Levinson's, and Trench's algorithms.
Proceedings of the IEEE International Conference on Acoustics, 1979


  Loading...