Stephen Moskal

According to our database1, Stephen Moskal authored at least 19 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Evolving Code with A Large Language Model.
CoRR, 2024

2023
LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing.
CoRR, 2023

2022
Alert-Driven Attack Graph Generation Using S-PDFA.
IEEE Trans. Dependable Secur. Comput., 2022

HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns.
CoRR, 2022

CyberEvo: evolutionary search of knowledge-based behaviors in a cyber attack campaign.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022

2021
SAGE: Intrusion Alert-driven Attack Graph Extractor.
CoRR, 2021

Translating Intrusion Alerts to Cyberattack Stages using Pseudo-Active Transfer Learning (PATRL).
Proceedings of the IEEE Conference on Communications and Network Security, 2021

Enabling Visual Analytics via Alert-driven Attack Graphs.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
On the Variety and Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks.
ACM Trans. Manag. Inf. Syst., 2020

Cyberattack Action-Intent-Framework for Mapping Intrusion Observables.
CoRR, 2020

Session-level Adversary Intent-Driven Cyberattack Simulator.
Proceedings of the 24th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2020

Dissecting Cyberadversarial Intrusion Stages via Interdisciplinary Observations.
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020

2019
On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks.
CoRR, 2019

Synthetic Intrusion Alert Generation through Generative Adversarial Networks.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

2018
Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

2016
Assessing the likelihood of cyber network infiltration using rare-event simulation.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

2014
Context Model Fusion for Multistage Network Attack Simulation.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

2013
Who Shall We Follow in Twitter for Cyber Vulnerability?
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013

Simulating attack behaviors in enterprise networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2013


  Loading...