Nandi Leslie

Orcid: 0000-0001-5888-8784

According to our database1, Nandi Leslie authored at least 30 papers between 2018 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Synthesizing Attack-Aware Control and Active Sensing Strategies Under Reactive Sensor Attacks.
IEEE Control. Syst. Lett., 2023

Optimal Decoy Resource Allocation for Proactive Defense in Probabilistic Attack Graphs.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

2022
Honeypot Allocation for Cyber Deception Under Uncertainty.
IEEE Trans. Netw. Serv. Manag., 2022

Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables.
J. Netw. Comput. Appl., 2022

2021
Deceptive Labeling: Hypergames on Graphs for Stealthy Deception.
IEEE Control. Syst. Lett., 2021

Honeypot Allocation for Cyber Deception in Internet of Battlefield Things Systems.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Pareto GAN: Extending the Representational Power of GANs to Heavy-Tailed Distributions.
Proceedings of the 38th International Conference on Machine Learning, 2021

An Unsupervised Learning Approach for In-Vehicle Network Intrusion Detection.
Proceedings of the 55th Annual Conference on Information Sciences and Systems, 2021

Qualitative Planning in Imperfect Information Games with Active Sensing and Reactive Sensor Attacks: Cost of Unawareness.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

2020
Secure-by-synthesis network with active deception and temporal logic specifications.
CoRR, 2020

Generative adversarial attacks against intrusion detection systems using active learning.
Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, 2020

Estimating Attack Risk of Network Activities in Temporal Domain: A Wavelet Transform Approach.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

Cybersecurity Deception Experimentation System.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020

Mitigation of Jamming Attacks via Deception.
Proceedings of the 31st IEEE Annual International Symposium on Personal, 2020

Honeypot Allocation over Attack Graphs in Cyber Deception Games.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

Software Diversity for Cyber Deception.
Proceedings of the IEEE Global Communications Conference, 2020

Learning and Planning in the Feature Deception Problem.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Harnessing the Power of Deception in Attack Graph-Based Security Games.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Decoy Allocation Games on Graphs with Temporal Logic Objectives.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

A Game Theoretic Framework for Software Diversity for Network Security.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Learning and Planning in Feature Deception Games.
CoRR, 2019

Statistical Models for the Number of Successful Cyber Intrusions.
CoRR, 2019

Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments.
Proceedings of the Information Security Applications - 20th International Conference, 2019

An Effective Approach to Classify Abnormal Network Traffic Activities using Wavelet Transform.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

A game-theoretic framework for dynamic cyber deception in internet of battlefield things.
Proceedings of the MobiQuitous 2019, 2019

Application of Trust Assessment Techniques to IoBT Systems.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Behavioral Cyber Deception: A Game and Prospect Theoretic Approach.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Approaches to Enhancing Cyber Resilience: Report of the North Atlantic Treaty Organization (NATO) Workshop IST-153.
CoRR, 2018

Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG.
CoRR, 2018


  Loading...