Nandi Leslie

According to our database1, Nandi Leslie authored at least 24 papers between 2018 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Deceptive Labeling: Hypergames on Graphs for Stealthy Deception.
IEEE Control. Syst. Lett., 2021

Qualitative Planning in Imperfect Information Games with Active Sensing and Reactive Sensor Attacks: Cost of Unawareness.
CoRR, 2021

Pareto GAN: Extending the Representational Power of GANs to Heavy-Tailed Distributions.
CoRR, 2021

2020
Secure-by-synthesis network with active deception and temporal logic specifications.
CoRR, 2020

Generative adversarial attacks against intrusion detection systems using active learning.
Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, 2020

Estimating Attack Risk of Network Activities in Temporal Domain: A Wavelet Transform Approach.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

Cybersecurity Deception Experimentation System.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020

Mitigation of Jamming Attacks via Deception.
Proceedings of the 31st IEEE Annual International Symposium on Personal, 2020

Honeypot Allocation over Attack Graphs in Cyber Deception Games.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

Software Diversity for Cyber Deception.
Proceedings of the IEEE Global Communications Conference, 2020

Learning and Planning in the Feature Deception Problem.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Harnessing the Power of Deception in Attack Graph-Based Security Games.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Decoy Allocation Games on Graphs with Temporal Logic Objectives.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

A Game Theoretic Framework for Software Diversity for Network Security.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Learning and Planning in Feature Deception Games.
CoRR, 2019

Statistical Models for the Number of Successful Cyber Intrusions.
CoRR, 2019

Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments.
Proceedings of the Information Security Applications - 20th International Conference, 2019

An Effective Approach to Classify Abnormal Network Traffic Activities using Wavelet Transform.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

A game-theoretic framework for dynamic cyber deception in internet of battlefield things.
Proceedings of the MobiQuitous 2019, 2019

Application of Trust Assessment Techniques to IoBT Systems.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Behavioral Cyber Deception: A Game and Prospect Theoretic Approach.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Approaches to Enhancing Cyber Resilience: Report of the North Atlantic Treaty Organization (NATO) Workshop IST-153.
CoRR, 2018

Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG.
CoRR, 2018


  Loading...