Kevin M. Carter

According to our database1, Kevin M. Carter authored at least 17 papers between 2010 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 





Toward Finding Malicious Cyber Discussions in Social Media.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

Reports of the 2016 AAAI Workshop Program.
AI Magazine, 2016

Balancing Security and Performance for Agility in Dynamic Threat Environments.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Agent-based simulation in support of moving target cyber defense technology development and evaluation.
Proceedings of the 18th Symposium on Communications & Networking, 2015

Probabilistic Threat Propagation for Network Security.
IEEE Trans. Information Forensics and Security, 2014

Adaptive Attacker Strategy Development Against Moving Target Cyber Defenses.
CoRR, 2014

Quantitative Analysis of Active Cyber Defenses Based on Temporal Platform Diversity.
CoRR, 2014

Strategic evolution of adversaries against temporal platform diversity active cyber defenses.
Proceedings of the Agent-Directed Simulation Symposium, 2014

Latent community discovery through enterprise user search query modeling.
Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2014

Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

Characterizing Latent User Interests on Enterprise Networks.
Proceedings of the Twenty-Seventh International Florida Artificial Intelligence Research Society Conference, 2014

Evaluating topic quality using model clustering.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence and Data Mining, 2014

A Game Theoretic Approach to Strategy Determination for Dynamic Platform Defenses.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

Probabilistic threat propagation for malicious activity detection.
Proceedings of the IEEE International Conference on Acoustics, 2013

An Expectation Maximization Approach to Detecting Compromised Remote Access Accounts.
Proceedings of the Twenty-Sixth International Florida Artificial Intelligence Research Society Conference, 2013

Probabilistic reasoning for streaming anomaly detection.
Proceedings of the IEEE Statistical Signal Processing Workshop, 2012

Temporally oblivious anomaly detection on large networks using functional peers.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010