Kevin M. Carter
According to our database1, Kevin M. Carter authored at least 17 papers between 2010 and 2017.
Legend:Book In proceedings Article PhD thesis Other
Toward Finding Malicious Cyber Discussions in Social Media.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017
Reports of the 2016 AAAI Workshop Program.
AI Magazine, 2016
Balancing Security and Performance for Agility in Dynamic Threat Environments.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Agent-based simulation in support of moving target cyber defense technology development and evaluation.
Proceedings of the 18th Symposium on Communications & Networking, 2015
Probabilistic Threat Propagation for Network Security.
IEEE Trans. Information Forensics and Security, 2014
Adaptive Attacker Strategy Development Against Moving Target Cyber Defenses.
Quantitative Analysis of Active Cyber Defenses Based on Temporal Platform Diversity.
Strategic evolution of adversaries against temporal platform diversity active cyber defenses.
Proceedings of the Agent-Directed Simulation Symposium, 2014
Latent community discovery through enterprise user search query modeling.
Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2014
Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Characterizing Latent User Interests on Enterprise Networks.
Proceedings of the Twenty-Seventh International Florida Artificial Intelligence Research Society Conference, 2014
Evaluating topic quality using model clustering.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence and Data Mining, 2014
A Game Theoretic Approach to Strategy Determination for Dynamic Platform Defenses.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014
Probabilistic threat propagation for malicious activity detection.
Proceedings of the IEEE International Conference on Acoustics, 2013
An Expectation Maximization Approach to Detecting Compromised Remote Access Accounts.
Proceedings of the Twenty-Sixth International Florida Artificial Intelligence Research Society Conference, 2013
Probabilistic reasoning for streaming anomaly detection.
Proceedings of the IEEE Statistical Signal Processing Workshop, 2012
Temporally oblivious anomaly detection on large networks using functional peers.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010