William W. Streilein

Affiliations:
  • Massachusetts Institute of Technology


According to our database1, William W. Streilein authored at least 27 papers between 1997 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Engineering and Implementation of SimAEN.
CoRR, 2021

Proceedings - AI/ML for Cybersecurity: Challenges, Solutions, and Novel Ideas at SIAM Data Mining 2021.
CoRR, 2021

2020
Proceedings of the Artificial Intelligence for Cyber Security (AICS) Workshop 2020.
CoRR, 2020

2019
Reports of the Workshops Held at the 2019 AAAI Conference on Artificial Intelligence.
AI Mag., 2019

2018
Proceedings of the Artificial Intelligence for Cyber Security (AICS) Workshop 2019.
CoRR, 2018

Reports of the Workshops of the 32nd AAAI Conference on Artificial Intelligence.
AI Mag., 2018

2017
Reports of the Workshops of the Thirty-First AAAI Conference on Artificial Intelligence.
AI Mag., 2017

A nature-inspired decision system for secure cyber network architecture.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

Toward Finding Malicious Cyber Discussions in Social Media.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Reports of the 2016 AAAI Workshop Program.
AI Mag., 2016

Towards automated cyber decision support: A case study on network segmentation for security.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

A Model-Based Approach to Predicting the Performance of Insider Threat Detection Systems.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Balancing Security and Performance for Agility in Dynamic Threat Environments.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2015
Agent-based simulation for assessing network security risk due to unauthorized hardware.
Proceedings of the Symposium on Agent-Directed Simulation, 2015

Agent-based simulation in support of moving target cyber defense technology development and evaluation.
Proceedings of the 18th Symposium on Communications & Networking, 2015

Timely Rerandomization for Mitigating Memory Disclosures.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Probabilistic Threat Propagation for Network Security.
IEEE Trans. Inf. Forensics Secur., 2014

Finding Focus in the Blur of Moving-Target Techniques.
IEEE Secur. Priv., 2014

Adaptive Attacker Strategy Development Against Moving Target Cyber Defenses.
CoRR, 2014

On the Challenges of Effective Movement.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

2013
Systematic Analysis of Defenses against Return-Oriented Programming.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Probabilistic threat propagation for malicious activity detection.
Proceedings of the IEEE International Conference on Acoustics, 2013

Modeling how thinking about the past and future impacts network traffic with the gosmr architecture.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

2012
Probabilistic reasoning for streaming anomaly detection.
Proceedings of the IEEE Statistical Signal Processing Workshop, 2012

2011
Cyber situational awareness through operational streaming analysis.
Proceedings of the MILCOM 2011, 2011

1998
Familiarity Discrimination of Radar Pulses.
Proceedings of the Advances in Neural Information Processing Systems 11, [NIPS Conference, Denver, Colorado, USA, November 30, 1998

1997
ARTMAP-FD: familiarity discrimination applied to radar target recognition.
Proceedings of International Conference on Neural Networks (ICNN'97), 1997


  Loading...