Jaime C. Acosta

Orcid: 0000-0003-2555-9989

According to our database1, Jaime C. Acosta authored at least 30 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A pipeline approach for privacy preservation against poisoning attacks in a Mobile Edge Computing environment.
Ad Hoc Networks, March, 2024

2023
Survey and Taxonomy of Adversarial Reconnaissance Techniques.
ACM Comput. Surv., 2023

Adversarial Reconnaissance Mitigation and Modeling.
CoRR, 2023

Bayesian Models for Node-Based Inference Techniques.
Proceedings of the IEEE International Systems Conference, 2023

A Systematic Approach for Temporal Traffic Selection Across Various Applications.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Cyber Deception System based on Monte Carlo Simulation in the Mobile Edge Computing (MEC).
Proceedings of the International Conference on Computer, 2023

2022
Poster: Toward Dynamic, Session-Preserving, Transition from Low to High Interaction Honeypots.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

Locally-Hosted Fidelity-Adaptive Honeypots with Connection-Preserving Capabilities.
Proceedings of the IEEE Military Communications Conference, 2022

Enabling Device Trustworthiness for SDN-Enabled Internet -of- Battlefield Things.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

2021
Repeatable Experimentation for Cybersecurity Moving Target Defense.
Proceedings of the Security and Privacy in Communication Networks, 2021

Deep Learning for Cyber Deception in Wireless Networks.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Network Data Curation Toolkit: Cybersecurity Data Collection, Aided-Labeling, and Rule Generation.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Lightweight On-Demand Honeypot Deployment for Cyber Deception.
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021

2020
Achieving Sensor Identification and Data Flow Integrity in Critical Cyber-Physical Infrastructures.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Cybersecurity Deception Experimentation System.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020

Cybersecurity Methodology for Specialized Behavior Analysis.
Proceedings of the Digital Forensics and Cyber Crime - 11th EAI International Conference, 2020

Software Diversity for Cyber Deception.
Proceedings of the IEEE Global Communications Conference, 2020

2019
A System for Analyzing Diversified Software Binaries.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things Security.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

2017
A platform for evaluator-centric cybersecurity training and data acquisition.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

2016
Augmenting attack graphs to represent data link and network layer vulnerabilities.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

An Analysis Platform for Execution-Based Model Generation.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

2013
Emulating internet topology snapshots in deterlab.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
An efficient common substrings algorithm for on-the-fly behavior-based malware detection and analysis.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Survivability prediction of ad hoc networks under attack.
Proceedings of the 31st IEEE Military Communications Conference, 2012

2011
Achieving rapport with turn-by-turn, user-responsive emotional coloring.
Speech Commun., 2011

Using a novel blending method over multiple network connections for secure communication.
Proceedings of the MILCOM 2011, 2011

2009
Using Emotion to Gain Rapport in a Spoken Dialog System.
Proceedings of the Human Language Technologies: Conference of the North American Chapter of the Association of Computational Linguistics, Proceedings, May 31, 2009

Responding to user emotional state by adding emotional coloring to utterances.
Proceedings of the INTERSPEECH 2009, 2009

2004
A Framework for Profiling Multiprocessor Memory Performance.
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004


  Loading...