Michael Atighetchi

Affiliations:
  • BBN Technologies


According to our database1, Michael Atighetchi authored at least 47 papers between 1998 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Towards Decentralized and Provably Secure Cross-Domain Solutions.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021

Using Distributed Ledgers For Command and Control - Concepts and Challenges.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Dynamic Explanation of Bayesian Networks with Abductive Bayes Factor Qualitative Propagation and Entropy-Based Qualitative Explanation.
Proceedings of the 24th IEEE International Conference on Information Fusion, 2021

2020
An Autonomous Resiliency Toolkit for Cyber Defense Platforms.
Proceedings of the 12th International Conference on Agents and Artificial Intelligence, 2020

2019
Security Requirements Analysis - A Vision for an Automated Toolchain.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Mission-Centric Content Sharing Across Heterogeneous Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Remote Management of Boundary Protection Devices with Information Restrictions.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2017
A Flexible Approach Towards Security Validation.
Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, 2017

2016
Using Ontologies to Quantify Attack Surfaces.
Proceedings of the Eleventh Conference on Semantic Technology for Intelligence, 2016

Semi-automated wrapping of defenses (SAWD) for cyber command and control.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

An autonomous resiliency toolkit - needs, challenges, and concepts for next generation cyber defense platforms.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Experimentation Support for Cyber Security Evaluations.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2015
Use of machine learning in big data analytics for insider threat detection.
Proceedings of the 34th IEEE Military Communications Conference, 2015

2014
Federated Access to Cyber Observables for Detection of Targeted Attacks.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Secure and QoS-Managed Information Exchange Between Enterprise and Constrained Environments.
Proceedings of the 17th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2014

2013
Using Machine Learning for Behavior-Based Access Control: Scalable Anomaly Detection on TCP Connections and HTTP Requests.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Assessing trustworthiness in collaborative environments.
Proceedings of the Cyber Security and Information Intelligence, 2013

Safe configuration of TLS connections.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Cooperative red teaming of a prototype surivable service-oriented system.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Avoiding common security flaws in composed service-oriented systems.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

2011
Transparent Insertion of Custom Logic in HTTP(S) Streams Using PbProxy.
IEEE Internet Comput., 2011

A Survey of Security Concepts for Common Operating Environments.
Proceedings of the 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2011

2010
Managed Mission Assurance - Concept, Methodology and Runtime Support.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Dynamic cross domain information sharing: a concept paper on flexible adaptive policy management.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

Understanding the Vulnerabilities of a SOA Platform - A Case Study.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

Advanced Protected Services - A Concept Paper on Survivable Service-Oriented Systems.
Proceedings of the 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2010

Usable Survivability.
Proceedings of the Eighth International Network Conference (INC 2010), 2010

Leveraging ESM platforms for continuous mission-oriented assessment of information assurance.
Proceedings of the 6th International Conference on Network and Service Management, 2010

Adjustable autonomy for cross-domain entitlement decisions.
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010

2009
Attribute-Based Prevention of Phishing Attacks.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

From Auto-adaptive to Survivable and Self-Regenerative Systems.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

2008
Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

An abstract interface for cyber-defense mechanisms.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

Effective Monitoring of a Survivable Distributed Networked Information System.
Proceedings of the The Third International Conference on Availability, 2008

2006
An architecture for adaptive intrusion-tolerant applications.
Softw. Pract. Exp., 2006

Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing.
Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, 2006

2005
Integrated Adaptive QoS Management in Middleware: A Case Study.
Real Time Syst., 2005

Networking Aspects in the DPASA Survivability Architecture: An Experience Report.
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005

Survivability Architecture of a Mission Critical System: The DPASA Example.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Adaptive Cyberdefense for Survival and Intrusion Tolerance.
IEEE Internet Comput., 2004

2003
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense.
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003

Building Auto-Adaptive Distributed Applications: The QuO-APOD Experience.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

2002
Packaging Quality of Service Control Behaviors for Reuse.
Proceedings of the 5th International Symposiun on Object Oriented Real-Time Distributed Computing, 2002

2001
Comparing and Contrasting Adaptive Middleware Support in Wide-Area and Embedded Distributed Object Applications.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

1999
The UMASS Intelligent Home Project.
Proceedings of the Third Annual Conference on Autonomous Agents, 1999

Learning Quantitative Knowledge for Multiagent Coordination.
Proceedings of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence, 1999

1998
A Randomized ANOVA Procedure for Comparing Performance Curves.
Proceedings of the Fifteenth International Conference on Machine Learning (ICML 1998), 1998


  Loading...