BibTeX records: Alexander Kott

download as .bib file

@article{DBLP:journals/cacm/LinkovLSPS0K23,
  author       = {Igor Linkov and
                  Alexandre K. Ligo and
                  Kelsey Stoddard and
                  Beatrice Perez and
                  Andrew Strelzoff and
                  Emanuele Bellini and
                  Alexander Kott},
  title        = {Cyber Efficiency and Cyber Resilience},
  journal      = {Commun. {ACM}},
  volume       = {66},
  number       = {4},
  pages        = {33--37},
  year         = {2023},
  url          = {https://doi.org/10.1145/3549073},
  doi          = {10.1145/3549073},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/LinkovLSPS0K23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/WeismanKV23,
  author       = {Michael J. Weisman and
                  Alexander Kott and
                  Joachim Vandekerckhove},
  title        = {Piecewise Linear and Stochastic Models for the Analysis of Cyber Resilience},
  booktitle    = {57th Annual Conference on Information Sciences and Systems, {CISS}
                  2023, Baltimore, MD, USA, March 22-24, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CISS56502.2023.10089725},
  doi          = {10.1109/CISS56502.2023.10089725},
  timestamp    = {Sat, 22 Apr 2023 16:25:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/WeismanKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cycon/LinkovSSGKTKBT23,
  author       = {Igor Linkov and
                  Kelsey Stoddard and
                  Andrew Strelzoff and
                  Stephanie Elisabeth Galaitsi and
                  Jeffrey M. Keisler and
                  Benjamin D. Trump and
                  Alexander Kott and
                  Pavol Bielik and
                  Petar Tsankov},
  editor       = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and
                  D. Giovannelli and
                  Karlis Podins and
                  I. Winther},
  title        = {Toward Mission-Critical {AI:} Interpretable, Actionable, and Resilient
                  {AI}},
  booktitle    = {15th International Conference on Cyber Conflict: Meeting Reality,
                  CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023},
  pages        = {181--197},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.23919/CyCon58705.2023.10181349},
  doi          = {10.23919/CYCON58705.2023.10181349},
  timestamp    = {Mon, 31 Jul 2023 13:56:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cycon/LinkovSSGKTKBT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/SunXSBKX23,
  author       = {Zheyuan Sun and
                  Maochao Xu and
                  Kristin M. Schweitzer and
                  Raymond M. Bateman and
                  Alexander Kott and
                  Shouhuai Xu},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Cyber Attacks Against Enterprise Networks: Characterization, Modeling
                  and Forecasting},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {60--81},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_4},
  doi          = {10.1007/978-3-031-45933-7\_4},
  timestamp    = {Wed, 06 Dec 2023 13:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/SunXSBKX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-04413,
  author       = {Alexander Kott and
                  Michael J. Weisman and
                  Joachim Vandekerckhove},
  title        = {Mathematical Modeling of Cyber Resilience},
  journal      = {CoRR},
  volume       = {abs/2302.04413},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.04413},
  doi          = {10.48550/ARXIV.2302.04413},
  eprinttype    = {arXiv},
  eprint       = {2302.04413},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-04413.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-04982,
  author       = {Michael J. Weisman and
                  Alexander Kott and
                  Joachim Vandekerckhove},
  title        = {Piecewise Linear and Stochastic Models for the Analysis of Cyber Resilience},
  journal      = {CoRR},
  volume       = {abs/2302.04982},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.04982},
  doi          = {10.48550/ARXIV.2302.04982},
  eprinttype    = {arXiv},
  eprint       = {2302.04982},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-04982.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-07941,
  author       = {Jason E. Ellis and
                  Travis W. Parker and
                  Joachim Vandekerckhove and
                  Brian J. Murphy and
                  Sidney C. Smith and
                  Alexander Kott and
                  Michael J. Weisman},
  title        = {An Experimentation Infrastructure for Quantitative Measurements of
                  Cyber Resilience},
  journal      = {CoRR},
  volume       = {abs/2302.07941},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.07941},
  doi          = {10.48550/ARXIV.2302.07941},
  eprinttype    = {arXiv},
  eprint       = {2302.07941},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-07941.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-16307,
  author       = {Michael J. Weisman and
                  Alexander Kott and
                  Jason E. Ellis and
                  Brian J. Murphy and
                  Travis W. Parker and
                  Sidney C. Smith and
                  Joachim Vandekerckhove},
  title        = {Quantitative Measurement of Cyber Resilience: Modeling and Experimentation},
  journal      = {CoRR},
  volume       = {abs/2303.16307},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.16307},
  doi          = {10.48550/ARXIV.2303.16307},
  eprinttype    = {arXiv},
  eprint       = {2303.16307},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-16307.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-12408,
  author       = {Alexander Kott},
  title        = {Autonomous Intelligent Cyber-defense Agent: Introduction and Overview},
  journal      = {CoRR},
  volume       = {abs/2304.12408},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.12408},
  doi          = {10.48550/ARXIV.2304.12408},
  eprinttype    = {arXiv},
  eprint       = {2304.12408},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-12408.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/KottWV22,
  author       = {Alexander Kott and
                  Michael J. Weisman and
                  Joachim Vandekerckhove},
  title        = {Mathematical Modeling of Cyber Resilience},
  booktitle    = {{IEEE} Military Communications Conference, {MILCOM} 2022, Rockville,
                  MD, USA, November 28 - December 2, 2022},
  pages        = {849--854},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/MILCOM55135.2022.10017731},
  doi          = {10.1109/MILCOM55135.2022.10017731},
  timestamp    = {Wed, 08 Feb 2023 17:46:14 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/KottWV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/EllisPVMSKW22,
  author       = {Jason E. Ellis and
                  Travis W. Parker and
                  Joachim Vandekerckhove and
                  Brian J. Murphy and
                  Sidney C. Smith and
                  Alexander Kott and
                  Michael J. Weisman},
  title        = {An Experimentation Infrastructure for Quantitative Measurements of
                  Cyber Resilience},
  booktitle    = {{IEEE} Military Communications Conference, {MILCOM} 2022, Rockville,
                  MD, USA, November 28 - December 2, 2022},
  pages        = {855--860},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/MILCOM55135.2022.10017529},
  doi          = {10.1109/MILCOM55135.2022.10017529},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/EllisPVMSKW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-11111,
  author       = {Alexander Kott and
                  Paul Th{\'{e}}ron},
  title        = {Doers, not Watchers: Intelligent Autonomous Agents are a Path to Cyber
                  Resilience},
  journal      = {CoRR},
  volume       = {abs/2201.11111},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.11111},
  eprinttype    = {arXiv},
  eprint       = {2201.11111},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-11111.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-11117,
  author       = {Stephanie Elisabeth Galaitsi and
                  Benjamin D. Trump and
                  Jeffrey M. Keisler and
                  Igor Linkov and
                  Alexander Kott},
  title        = {Cybertrust: From Explainable to Actionable and Interpretable {AI}
                  {(AI2)}},
  journal      = {CoRR},
  volume       = {abs/2201.11117},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.11117},
  eprinttype    = {arXiv},
  eprint       = {2201.11117},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-11117.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-11148,
  author       = {Alexandre K. Ligo and
                  Alexander Kott and
                  Igor Linkov},
  title        = {Autonomous Cyber Defense Introduces Risk: Can We Manage the Risk?},
  journal      = {CoRR},
  volume       = {abs/2201.11148},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.11148},
  eprinttype    = {arXiv},
  eprint       = {2201.11148},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-11148.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-11152,
  author       = {Alexander Kott and
                  Maureen S. Golan and
                  Benjamin D. Trump and
                  Igor Linkov},
  title        = {Cyber Resilience: by Design or by Intervention?},
  journal      = {CoRR},
  volume       = {abs/2201.11152},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.11152},
  eprinttype    = {arXiv},
  eprint       = {2201.11152},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-11152.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KottL21,
  author       = {Alexander Kott and
                  Igor Linkov},
  title        = {To Improve Cyber Resilience, Measure It},
  journal      = {Computer},
  volume       = {54},
  number       = {2},
  pages        = {80--85},
  year         = {2021},
  url          = {https://doi.org/10.1109/MC.2020.3038411},
  doi          = {10.1109/MC.2020.3038411},
  timestamp    = {Mon, 22 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/KottL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KottGTL21,
  author       = {Alexander Kott and
                  Maureen S. Golan and
                  Benjamin D. Trump and
                  Igor Linkov},
  title        = {Cyber Resilience: by Design or by Intervention?},
  journal      = {Computer},
  volume       = {54},
  number       = {8},
  pages        = {112--117},
  year         = {2021},
  url          = {https://doi.org/10.1109/MC.2021.3082836},
  doi          = {10.1109/MC.2021.3082836},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KottGTL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LigoKL21,
  author       = {Alexandre K. Ligo and
                  Alexander Kott and
                  Igor Linkov},
  title        = {Autonomous Cyberdefense Introduces Risk: Can We Manage the Risk?},
  journal      = {Computer},
  volume       = {54},
  number       = {10},
  pages        = {106--110},
  year         = {2021},
  url          = {https://doi.org/10.1109/MC.2021.3099042},
  doi          = {10.1109/MC.2021.3099042},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LigoKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-00528,
  author       = {Alexandre K. Ligo and
                  Alexander Kott and
                  Igor Linkov},
  title        = {How to Measure Cyber Resilience of an Autonomous Agent: Approaches
                  and Challenges},
  journal      = {CoRR},
  volume       = {abs/2102.00528},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.00528},
  eprinttype    = {arXiv},
  eprint       = {2102.00528},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-00528.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-09455,
  author       = {Alexander Kott and
                  Igor Linkov},
  title        = {To Improve Cyber Resilience, Measure It},
  journal      = {CoRR},
  volume       = {abs/2102.09455},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.09455},
  eprinttype    = {arXiv},
  eprint       = {2102.09455},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-09455.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-11305,
  author       = {Vinicius G. Goecks and
                  Nicholas R. Waytowich and
                  Derrik E. Asher and
                  Song Jun Park and
                  Mark R. Mittrick and
                  John T. Richardson and
                  Manuel Vindiola and
                  Anne Logie and
                  Mark Dennison and
                  Theron Trout and
                  Priya Narayanan and
                  Alexander Kott},
  title        = {On games and simulators as a platform for development of artificial
                  intelligence for command and control},
  journal      = {CoRR},
  volume       = {abs/2110.11305},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.11305},
  eprinttype    = {arXiv},
  eprint       = {2110.11305},
  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-11305.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LinkovGTKK20,
  author       = {Igor Linkov and
                  Stephanie Elisabeth Galaitsi and
                  Benjamin D. Trump and
                  Jeffrey M. Keisler and
                  Alexander Kott},
  title        = {Cybertrust: From Explainable to Actionable and Interpretable Artificial
                  Intelligence},
  journal      = {Computer},
  volume       = {53},
  number       = {9},
  pages        = {91--96},
  year         = {2020},
  url          = {https://doi.org/10.1109/MC.2020.2993623},
  doi          = {10.1109/MC.2020.2993623},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LinkovGTKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KottT20,
  author       = {Alexander Kott and
                  Paul Th{\'{e}}ron},
  title        = {Doers, Not Watchers: Intelligent Autonomous Agents Are a Path to Cyber
                  Resilience},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {18},
  number       = {3},
  pages        = {62--66},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSEC.2020.2983714},
  doi          = {10.1109/MSEC.2020.2983714},
  timestamp    = {Tue, 09 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KottT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/TheronKDRLPMG20,
  author       = {Paul Th{\'{e}}ron and
                  Alexander Kott and
                  Martin Drasar and
                  Krzysztof Rzadca and
                  Beno{\^{\i}}t Leblanc and
                  Mauno Pihelgas and
                  Luigi V. Mancini and
                  Fabio De Gaspari},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Reference Architecture of an Autonomous Agent for Cyber Defense of
                  Complex Military Systems},
  booktitle    = {Adaptive Autonomous Secure Cyber Systems},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1\_1},
  doi          = {10.1007/978-3-030-33432-1\_1},
  timestamp    = {Mon, 03 Jan 2022 21:52:41 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/TheronKDRLPMG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/TheronK19,
  author       = {Paul Th{\'{e}}ron and
                  Alexander Kott},
  title        = {When Autonomous Intelligent Goodware Will Fight Autonomous Intelligent
                  Malware: {A} Possible Future of Cyber Defense},
  booktitle    = {2019 {IEEE} Military Communications Conference, {MILCOM} 2019, Norfolk,
                  VA, USA, November 12-14, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/MILCOM47813.2019.9021038},
  doi          = {10.1109/MILCOM47813.2019.9021038},
  timestamp    = {Thu, 19 Mar 2020 08:47:16 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/TheronK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-04531,
  author       = {Nandi O. Leslie and
                  Richard E. Harang and
                  Lawrence P. Knachel and
                  Alexander Kott},
  title        = {Statistical Models for the Number of Successful Cyber Intrusions},
  journal      = {CoRR},
  volume       = {abs/1901.04531},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.04531},
  eprinttype    = {arXiv},
  eprint       = {1901.04531},
  timestamp    = {Fri, 01 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-04531.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-10086,
  author       = {Alexander Kott and
                  Ethan Stump},
  title        = {Intelligent Autonomous Things on the Battlefield},
  journal      = {CoRR},
  volume       = {abs/1902.10086},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.10086},
  eprinttype    = {arXiv},
  eprint       = {1902.10086},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-10086.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-05253,
  author       = {Michael J. De Lucia and
                  Allison Newcomb and
                  Alexander Kott},
  title        = {Features and Operation of an Autonomous Agent for Cyber Defense},
  journal      = {CoRR},
  volume       = {abs/1905.05253},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.05253},
  eprinttype    = {arXiv},
  eprint       = {1905.05253},
  timestamp    = {Tue, 28 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-05253.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-01959,
  author       = {Paul Th{\'{e}}ron and
                  Alexander Kott},
  title        = {When Autonomous Intelligent Goodware will Fight Autonomous Intelligent
                  Malware: {A} Possible Future of Cyber Defense},
  journal      = {CoRR},
  volume       = {abs/1912.01959},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.01959},
  eprinttype    = {arXiv},
  eprint       = {1912.01959},
  timestamp    = {Thu, 02 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-01959.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaaiss/Kott18,
  author       = {Alexander Kott},
  title        = {Challenges and Characteristics of Intelligent Autonomy for Internet
                  of Battle Things in Highly Adversarial Environments},
  booktitle    = {2018 {AAAI} Spring Symposia, Stanford University, Palo Alto, California,
                  USA, March 26-28, 2018},
  publisher    = {{AAAI} Press},
  year         = {2018},
  url          = {https://aaai.org/ocs/index.php/SSS/SSS18/paper/view/17470},
  timestamp    = {Tue, 08 Jan 2019 14:37:15 +0100},
  biburl       = {https://dblp.org/rec/conf/aaaiss/Kott18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcis/TheronKDRLPMP18,
  author       = {Paul Th{\'{e}}ron and
                  Alexander Kott and
                  Martin Drasar and
                  Krzysztof Rzadca and
                  Beno{\^{\i}}t LeBlanc and
                  Mauno Pihelgas and
                  Luigi V. Mancini and
                  Agostino Panico},
  title        = {Towards an active, autonomous and intelligent cyber defense of military
                  systems: The {NATO} {AICA} reference architecture},
  booktitle    = {International Conference on Military Communications and Information
                  Systems, {ICMCIS} 2018, Warsaw, Poland, May 22-23, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICMCIS.2018.8398730},
  doi          = {10.1109/ICMCIS.2018.8398730},
  timestamp    = {Fri, 19 Apr 2024 13:06:13 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcis/TheronKDRLPMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-10664,
  author       = {Alexander Kott and
                  Luigi V. Mancini and
                  Paul Th{\'{e}}ron and
                  Martin Drasar and
                  Edlira Dushku and
                  Heiko G{\"{u}}nther and
                  Markus Kont and
                  Beno{\^{\i}}t Leblanc and
                  Agostino Panico and
                  Mauno Pihelgas and
                  Krzysztof Rzadca},
  title        = {Initial Reference Architecture of an Intelligent Autonomous Agent
                  for Cyber Defense},
  journal      = {CoRR},
  volume       = {abs/1803.10664},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.10664},
  eprinttype    = {arXiv},
  eprint       = {1803.10664},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-10664.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-11256,
  author       = {Alexander Kott},
  title        = {Challenges and Characteristics of Intelligent Autonomy for Internet
                  of Battle Things in Highly Adversarial Environments},
  journal      = {CoRR},
  volume       = {abs/1803.11256},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.11256},
  eprinttype    = {arXiv},
  eprint       = {1803.11256},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-11256.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-07646,
  author       = {Alexander Kott and
                  Ryan Thomas and
                  Martin Drasar and
                  Markus Kont and
                  Alexander Poylisher and
                  Benjamin A. Blakely and
                  Paul Th{\'{e}}ron and
                  Nathaniel Evans and
                  Nandi Leslie and
                  Rajdeep Singh and
                  Maria Rigaki and
                  Shanchieh Jay Yang and
                  Beno{\^{\i}}t Leblanc and
                  Paul Losiewicz and
                  Sylvain Hourlier and
                  Misty K. Blowers and
                  Hugh Harney and
                  Gregory Wehner and
                  Alessandro Guarino and
                  Jana Kom{\'{a}}rkov{\'{a}} and
                  James Rowell},
  title        = {Toward Intelligent Autonomous Agents for Cyber Defense: Report of
                  the 2017 Workshop by the North Atlantic Treaty Organization {(NATO)}
                  Research Group {IST-152-RTG}},
  journal      = {CoRR},
  volume       = {abs/1804.07646},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.07646},
  eprinttype    = {arXiv},
  eprint       = {1804.07646},
  timestamp    = {Wed, 14 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-07646.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-07651,
  author       = {Alexander Kott and
                  Benjamin A. Blakely and
                  Diane Henshel and
                  Gregory Wehner and
                  James Rowell and
                  Nathaniel Evans and
                  Luis Mu{\~{n}}oz{-}Gonz{\'{a}}lez and
                  Nandi Leslie and
                  Donald W. French and
                  Donald Woodard and
                  Kerry Krutilla and
                  Amanda Joyce and
                  Igor Linkov and
                  Carmen Mas Machuca and
                  Janos Sztipanovits and
                  Hugh Harney and
                  Dennis Kergl and
                  Perri Nejib and
                  Edward Yakabovicz and
                  Steven Noel and
                  Tim Dudman and
                  Pierre Trepagnier and
                  Sowdagar Badesha and
                  Alfred M{\o}ller},
  title        = {Approaches to Enhancing Cyber Resilience: Report of the North Atlantic
                  Treaty Organization {(NATO)} Workshop {IST-153}},
  journal      = {CoRR},
  volume       = {abs/1804.07651},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.07651},
  eprinttype    = {arXiv},
  eprint       = {1804.07651},
  timestamp    = {Wed, 14 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-07651.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-02852,
  author       = {Igor Linkov and
                  Alexander Kott},
  title        = {Fundamental Concepts of Cyber Resilience: Introduction and Overview},
  journal      = {CoRR},
  volume       = {abs/1806.02852},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.02852},
  eprinttype    = {arXiv},
  eprint       = {1806.02852},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-02852.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-08349,
  author       = {Alessandro Oltramari and
                  Alexander Kott},
  title        = {Towards a Reconceptualisation of Cyber Risk: An Empirical and Ontological
                  Study},
  journal      = {CoRR},
  volume       = {abs/1806.08349},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.08349},
  eprinttype    = {arXiv},
  eprint       = {1806.08349},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-08349.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-08657,
  author       = {Paul Th{\'{e}}ron and
                  Alexander Kott and
                  Martin Drasar and
                  Krzysztof Rzadca and
                  Beno{\^{\i}}t Leblanc and
                  Mauno Pihelgas and
                  Luigi V. Mancini and
                  Agostino Panico},
  title        = {Towards an Active, Autonomous and Intelligent Cyber Defense of Military
                  Systems: the {NATO} {AICA} Reference Architecture},
  journal      = {CoRR},
  volume       = {abs/1806.08657},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.08657},
  eprinttype    = {arXiv},
  eprint       = {1806.08657},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-08657.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-08339,
  author       = {Alexander Kott and
                  Philip Perconti},
  title        = {Long-Term Forecasts of Military Technologies for a 20-30 Year Horizon:
                  An Empirical Assessment of Accuracy},
  journal      = {CoRR},
  volume       = {abs/1807.08339},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.08339},
  eprinttype    = {arXiv},
  eprint       = {1807.08339},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-08339.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-10808,
  author       = {Edward Colbert and
                  Alexander Kott and
                  Lawrence P. Knachel},
  title        = {Game-Theoretic Model and Experimental Investigation of Cyber Wargaming},
  journal      = {CoRR},
  volume       = {abs/1809.10808},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.10808},
  eprinttype    = {arXiv},
  eprint       = {1809.10808},
  timestamp    = {Thu, 31 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-10808.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-08014,
  author       = {Alexander Kott},
  title        = {Intelligent Autonomous Agents are Key to Cyber Defense of the Future
                  Army Networks},
  journal      = {CoRR},
  volume       = {abs/1812.08014},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.08014},
  eprinttype    = {arXiv},
  eprint       = {1812.08014},
  timestamp    = {Wed, 02 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-08014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KottA17,
  author       = {Alexander Kott and
                  David S. Alberts},
  title        = {How Do You Command an Army of Intelligent Things?},
  journal      = {Computer},
  volume       = {50},
  number       = {12},
  pages        = {96--100},
  year         = {2017},
  url          = {https://doi.org/10.1109/MC.2017.4451205},
  doi          = {10.1109/MC.2017.4451205},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KottA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KottLL17,
  author       = {Alexander Kott and
                  Jackson Ludwig and
                  Mona Lange},
  title        = {Assessing Mission Impact of Cyberattacks: Toward a Model-Driven Paradigm},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {5},
  pages        = {65--74},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.3681068},
  doi          = {10.1109/MSP.2017.3681068},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KottLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HarangK17,
  author       = {Richard E. Harang and
                  Alexander Kott},
  title        = {Burstiness of Intrusion Detection Process: Empirical Evidence and
                  a Modeling Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {10},
  pages        = {2348--2359},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2705629},
  doi          = {10.1109/TIFS.2017.2705629},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HarangK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kott17,
  author       = {Alexander Kott},
  title        = {Overview of Cyber Science and Technology Programs at the {U.S.} Army
                  Research Laboratory},
  journal      = {CoRR},
  volume       = {abs/1702.04652},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.04652},
  eprinttype    = {arXiv},
  eprint       = {1702.04652},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kott17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LangeKBMBVMMM17,
  author       = {Mona Lange and
                  Alexander Kott and
                  Noam Ben{-}Asher and
                  Wim Mees and
                  Nazife Baykal and
                  Cristian{-}Mihai Vidu and
                  Matteo Merialdo and
                  Marek Malowidzki and
                  Bhopinder Madahar},
  title        = {Recommendations for Model-Driven Paradigms for Integrated Approaches
                  to Cyber Defense},
  journal      = {CoRR},
  volume       = {abs/1703.03306},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.03306},
  eprinttype    = {arXiv},
  eprint       = {1703.03306},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LangeKBMBVMMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HarangK17,
  author       = {Richard E. Harang and
                  Alexander Kott},
  title        = {Burstiness of Intrusion Detection Process: Empirical Evidence and
                  a Modeling Approach},
  journal      = {CoRR},
  volume       = {abs/1707.03927},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.03927},
  eprinttype    = {arXiv},
  eprint       = {1707.03927},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HarangK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-07424,
  author       = {Edward J. M. Colbert and
                  D. T. Sullivan and
                  Alexander Kott},
  title        = {Cyber-Physical War Gaming},
  journal      = {CoRR},
  volume       = {abs/1708.07424},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.07424},
  eprinttype    = {arXiv},
  eprint       = {1708.07424},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-07424.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-04148,
  author       = {Alexander Kott and
                  Mona Lange and
                  Jackson Ludwig},
  title        = {Approaches to Modeling the Impact of Cyber Attacks on a Mission},
  journal      = {CoRR},
  volume       = {abs/1710.04148},
  year         = {2017},
  url          = {http://arxiv.org/abs/1710.04148},
  eprinttype    = {arXiv},
  eprint       = {1710.04148},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-04148.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-08976,
  author       = {Alexander Kott and
                  David S. Alberts},
  title        = {How do you Command an Army of Intelligent Things?},
  journal      = {CoRR},
  volume       = {abs/1712.08976},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.08976},
  eprinttype    = {arXiv},
  eprint       = {1712.08976},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-08976.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-08980,
  author       = {Alexander Kott and
                  Ananthram Swami and
                  Bruce J. West},
  title        = {The Internet of Battle Things},
  journal      = {CoRR},
  volume       = {abs/1712.08980},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.08980},
  eprinttype    = {arXiv},
  eprint       = {1712.08980},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-08980.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KottSW16,
  author       = {Alexander Kott and
                  Ananthram Swami and
                  Bruce J. West},
  title        = {The Fog of War in Cyberspace},
  journal      = {Computer},
  volume       = {49},
  number       = {11},
  pages        = {84--87},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.333},
  doi          = {10.1109/MC.2016.333},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KottSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KottSW16a,
  author       = {Alexander Kott and
                  Ananthram Swami and
                  Bruce J. West},
  title        = {The Internet of Battle Things},
  journal      = {Computer},
  volume       = {49},
  number       = {12},
  pages        = {70--75},
  year         = {2016},
  url          = {https://doi.org/10.1109/MC.2016.355},
  doi          = {10.1109/MC.2016.355},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KottSW16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KottSBMSJLV16,
  author       = {Alexander Kott and
                  Nikolai T. Stoianov and
                  Nazife Baykal and
                  Alfred M{\o}ller and
                  Reginald E. Sawilla and
                  Pram Jain and
                  Mona Lange and
                  Cristian Vidu},
  title        = {Assessing Mission Impact of Cyberattacks: Report of the {NATO} {IST-128}
                  Workshop},
  journal      = {CoRR},
  volume       = {abs/1601.00912},
  year         = {2016},
  url          = {http://arxiv.org/abs/1601.00912},
  eprinttype    = {arXiv},
  eprint       = {1601.00912},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/KottSBMSJLV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GroundKB16,
  author       = {Larry Ground and
                  Alexander Kott and
                  Ray Budd},
  title        = {Coalition-based Planning of Military Operations: Adversarial Reasoning
                  Algorithms in an Integrated Decision Aid},
  journal      = {CoRR},
  volume       = {abs/1601.06069},
  year         = {2016},
  url          = {http://arxiv.org/abs/1601.06069},
  eprinttype    = {arXiv},
  eprint       = {1601.06069},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GroundKB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KottBGRL16,
  author       = {Alexander Kott and
                  Ray Budd and
                  Larry Ground and
                  V. Lakshmi Rebbapragada and
                  John Langston},
  title        = {Decision Aids for Adversarial Planning in Military Operations: Algorithms,
                  Tools, and Turing-test-like Experimental Validation},
  journal      = {CoRR},
  volume       = {abs/1601.06108},
  year         = {2016},
  url          = {http://arxiv.org/abs/1601.06108},
  eprinttype    = {arXiv},
  eprint       = {1601.06108},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KottBGRL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KottA16,
  author       = {Alexander Kott and
                  Tarek F. Abdelzaher},
  title        = {Resiliency and Robustness of Complex, Multi-Genre Networks},
  journal      = {CoRR},
  volume       = {abs/1601.06731},
  year         = {2016},
  url          = {http://arxiv.org/abs/1601.06731},
  eprinttype    = {arXiv},
  eprint       = {1601.06731},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KottA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KottS16,
  author       = {Alexander Kott and
                  Bruce Skarin},
  title        = {Approaches to Modeling Insurgency},
  journal      = {CoRR},
  volume       = {abs/1603.01787},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.01787},
  eprinttype    = {arXiv},
  eprint       = {1603.01787},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KottS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/YoungK16,
  author       = {Stuart Young and
                  Alexander Kott},
  title        = {A Survey of Research on Control of Teams of Small Robots in Military
                  Operations},
  journal      = {CoRR},
  volume       = {abs/1606.01288},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.01288},
  eprinttype    = {arXiv},
  eprint       = {1606.01288},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/YoungK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KottM16,
  author       = {Alexander Kott and
                  Stephen Morse},
  title        = {The Role of {PMESII} Modeling in a Continuous Cycle of Anticipation
                  and Action},
  journal      = {CoRR},
  volume       = {abs/1607.06515},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.06515},
  eprinttype    = {arXiv},
  eprint       = {1607.06515},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KottM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/OwnbyK16,
  author       = {Michael Ownby and
                  Alexander Kott},
  title        = {Predicting Enemy's Actions Improves Commander Decision-Making},
  journal      = {CoRR},
  volume       = {abs/1607.06759},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.06759},
  eprinttype    = {arXiv},
  eprint       = {1607.06759},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/OwnbyK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KottM16a,
  author       = {Alexander Kott and
                  Wes Milks},
  title        = {Validation of Information Fusion},
  journal      = {CoRR},
  volume       = {abs/1607.07288},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.07288},
  eprinttype    = {arXiv},
  eprint       = {1607.07288},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KottM16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HubbardKM16,
  author       = {Paul Hubbard and
                  Alexander Kott and
                  Michael Martin},
  title        = {Inducing and Mitigating a Self-Reinforcing Degradation in Decision-making
                  Teams},
  journal      = {CoRR},
  volume       = {abs/1607.08139},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.08139},
  eprinttype    = {arXiv},
  eprint       = {1607.08139},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HubbardKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BlowersICK16,
  author       = {Misty K. Blowers and
                  Jose Iribarne and
                  Edward Colbert and
                  Alexander Kott},
  title        = {The Future Internet of Things and Security of its Control Systems},
  journal      = {CoRR},
  volume       = {abs/1610.01953},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.01953},
  eprinttype    = {arXiv},
  eprint       = {1610.01953},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BlowersICK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KottAW15,
  author       = {Alexander Kott and
                  David S. Alberts and
                  Cliff Wang},
  title        = {Will Cybersecurity Dictate the Outcome of Future Wars?},
  journal      = {Computer},
  volume       = {48},
  number       = {12},
  pages        = {98--101},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.359},
  doi          = {10.1109/MC.2015.359},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KottAW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KottSM15,
  author       = {Alexander Kott and
                  Ananthram Swami and
                  Patrick D. McDaniel},
  title        = {Six Potential Game-Changers in Cyber Security: Towards Priorities
                  in Cyber Science and Engineering},
  journal      = {CoRR},
  volume       = {abs/1511.00509},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.00509},
  eprinttype    = {arXiv},
  eprint       = {1511.00509},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KottSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KottBS15,
  author       = {Alexander Kott and
                  Norbou Buchler and
                  Kristin E. Schaefer},
  title        = {Kinetic and Cyber},
  journal      = {CoRR},
  volume       = {abs/1511.03531},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.03531},
  eprinttype    = {arXiv},
  eprint       = {1511.03531},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KottBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KottAW15,
  author       = {Alexander Kott and
                  David S. Alberts and
                  Cliff Wang},
  title        = {War of 2050: a Battle for Information, Communications, and Computer
                  Security},
  journal      = {CoRR},
  volume       = {abs/1512.00360},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.00360},
  eprinttype    = {arXiv},
  eprint       = {1512.00360},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KottAW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kott15,
  author       = {Alexander Kott},
  title        = {Science of Cyber Security as a System of Models and Problems},
  journal      = {CoRR},
  volume       = {abs/1512.00407},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.00407},
  eprinttype    = {arXiv},
  eprint       = {1512.00407},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kott15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KottA15,
  author       = {Alexander Kott and
                  Curtis Arnold},
  title        = {Towards Approaches to Continuous Assessment of Cyber Risk in Security
                  of Computer Networks},
  journal      = {CoRR},
  volume       = {abs/1512.07937},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.07937},
  eprinttype    = {arXiv},
  eprint       = {1512.07937},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KottA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KottHWC15,
  author       = {Alexander Kott and
                  Jeff Hansberger and
                  Edward Waltz and
                  Peter Corpac},
  title        = {An Experimental Evaluation of Computational Techniques for Planning
                  and Assessment of International Interventions},
  journal      = {CoRR},
  volume       = {abs/1512.07941},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.07941},
  eprinttype    = {arXiv},
  eprint       = {1512.07941},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KottHWC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KottO15,
  author       = {Alexander Kott and
                  Michael Ownby},
  title        = {Toward a Research Agenda in Adversarial Reasoning: Computational Approaches
                  to Anticipating the Opponent's Intent and Actions},
  journal      = {CoRR},
  volume       = {abs/1512.07943},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.07943},
  eprinttype    = {arXiv},
  eprint       = {1512.07943},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KottO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CollierPGKL15,
  author       = {Zachary A. Collier and
                  Mahesh Panwar and
                  Alexander A. Ganin and
                  Alexander Kott and
                  Igor Linkov},
  title        = {Security Metrics in Industrial Control Systems},
  journal      = {CoRR},
  volume       = {abs/1512.08515},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.08515},
  eprinttype    = {arXiv},
  eprint       = {1512.08515},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CollierPGKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KottSM14,
  author       = {Alexander Kott and
                  Ananthram Swami and
                  Patrick D. McDaniel},
  title        = {Security Outlook: Six Cyber Game Changers for the Next 15 Years},
  journal      = {Computer},
  volume       = {47},
  number       = {12},
  pages        = {104--106},
  year         = {2014},
  url          = {https://doi.org/10.1109/MC.2014.366},
  doi          = {10.1109/MC.2014.366},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KottSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/McDanielJPPWKMS14,
  author       = {Patrick D. McDaniel and
                  Trent Jaeger and
                  Thomas F. La Porta and
                  Nicolas Papernot and
                  Robert J. Walls and
                  Alexander Kott and
                  Lisa M. Marvel and
                  Ananthram Swami and
                  Prasant Mohapatra and
                  Srikanth V. Krishnamurthy and
                  Iulian Neamtiu},
  editor       = {Sushil Jajodia and
                  Kun Sun},
  title        = {Security and Science of Agility},
  booktitle    = {Proceedings of the First {ACM} Workshop on Moving Target Defense,
                  {MTD} '14, Scottsdale, Arizona, USA, November 7, 2014},
  pages        = {13--19},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663474.2663476},
  doi          = {10.1145/2663474.2663476},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/McDanielJPPWKMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/crc/14/KottA14,
  author       = {Alexander Kott and
                  Tarek F. Abdelzaher},
  editor       = {Niranjan Suri and
                  Giacomo Cabri},
  title        = {Resiliency and Robustness of Complex Systems and Networks},
  booktitle    = {Adaptive, Dynamic, and Resilient Systems},
  series       = {Mobile Services and Systems Series},
  pages        = {67--86},
  publisher    = {{CRC} Press},
  year         = {2014},
  timestamp    = {Thu, 04 Jun 2020 17:40:00 +0200},
  biburl       = {https://dblp.org/rec/books/crc/14/KottA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Kott14,
  author       = {Alexander Kott},
  editor       = {Robinson E. Pino},
  title        = {Towards Fundamental Science of Cyber Security},
  booktitle    = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2\_1},
  doi          = {10.1007/978-1-4614-7597-2\_1},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Kott14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KottWE14,
  author       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Preview},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {1--5},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_1},
  doi          = {10.1007/978-3-319-11391-3\_1},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KottWE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/PinoK14,
  author       = {Robinson E. Pino and
                  Alexander Kott},
  editor       = {Robinson E. Pino and
                  Alexander Kott and
                  Michael J. Shevenell},
  title        = {Neuromorphic Computing for Cognitive Augmentation in Cyber Defense},
  booktitle    = {Cybersecurity Systems for Human Cognition Augmentation},
  series       = {Advances in Information Security},
  volume       = {61},
  pages        = {19--45},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10374-7\_2},
  doi          = {10.1007/978-3-319-10374-7\_2},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/PinoK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KottBS14,
  author       = {Alexander Kott and
                  Norbou Buchler and
                  Kristin E. Schaefer},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Kinetic and Cyber},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {29--45},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_3},
  doi          = {10.1007/978-3-319-11391-3\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KottBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KottWE14a,
  author       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Concluding Thoughts},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {323--328},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_15},
  doi          = {10.1007/978-3-319-11391-3\_15},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KottWE14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/61,
  editor       = {Robinson E. Pino and
                  Alexander Kott and
                  Michael J. Shevenell},
  title        = {Cybersecurity Systems for Human Cognition Augmentation},
  series       = {Advances in Information Security},
  volume       = {61},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10374-7},
  doi          = {10.1007/978-3-319-10374-7},
  isbn         = {978-3-319-10373-0},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/61.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/62,
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3},
  doi          = {10.1007/978-3-319-11391-3},
  isbn         = {978-3-319-11390-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/62.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KottA13,
  author       = {Alexander Kott and
                  Curtis Arnold},
  title        = {The Promises and Challenges of Continuous Monitoring and Risk Scoring},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {11},
  number       = {1},
  pages        = {90--93},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2013.19},
  doi          = {10.1109/MSP.2013.19},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KottA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/KottSMM11,
  author       = {Alexander Kott and
                  Rajdeep Singh and
                  William M. McEneaney and
                  Wes Milks},
  title        = {Hypothesis-driven information fusion in adversarial, deceptive environments},
  journal      = {Inf. Fusion},
  volume       = {12},
  number       = {2},
  pages        = {131--144},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.inffus.2010.09.001},
  doi          = {10.1016/J.INFFUS.2010.09.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inffus/KottSMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fusion/KottM09,
  author       = {Alexander Kott and
                  Wes Milks},
  title        = {Approaches to validation of information fusion systems},
  booktitle    = {12th International Conference on Information Fusion, {FUSION} '09,
                  Seattle, Washington, USA, July 6-9, 2009},
  pages        = {882--889},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://ieeexplore.ieee.org/document/5203626/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fusion/KottM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/KottBGRL05,
  author       = {Alexander Kott and
                  Ray Budd and
                  Larry Ground and
                  V. Lakshmi Rebbapragada and
                  John Langston},
  title        = {Building a Tool for Battle Planning: Challenges, Tradeoffs, and Experimental
                  Findings},
  journal      = {Appl. Intell.},
  volume       = {23},
  number       = {3},
  pages        = {165--189},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10489-005-4606-z},
  doi          = {10.1007/S10489-005-4606-Z},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/apin/KottBGRL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/expert/RaschKF03,
  author       = {Robert Rasch and
                  Alexander Kott and
                  Kenneth D. Forbus},
  title        = {Incorporating {AI} into Military Decision Making: An Experiment},
  journal      = {{IEEE} Intell. Syst.},
  volume       = {18},
  number       = {4},
  pages        = {18--26},
  year         = {2003},
  url          = {https://doi.org/10.1109/MIS.2003.1217624},
  doi          = {10.1109/MIS.2003.1217624},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/expert/RaschKF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/KottGBRL02,
  author       = {Alexander Kott and
                  Larry Ground and
                  Ray Budd and
                  V. Lakshmi Rebbapragada and
                  John Langston},
  editor       = {Rina Dechter and
                  Michael J. Kearns and
                  Richard S. Sutton},
  title        = {Toward Practical Knowledge-Based Tools for Battle Planning and Scheduling},
  booktitle    = {Proceedings of the Eighteenth National Conference on Artificial Intelligence
                  and Fourteenth Conference on Innovative Applications of Artificial
                  Intelligence, July 28 - August 1, 2002, Edmonton, Alberta, Canada},
  pages        = {894--899},
  publisher    = {{AAAI} Press / The {MIT} Press},
  year         = {2002},
  url          = {http://www.aaai.org/Library/AAAI/2002/aaai02-132.php},
  timestamp    = {Tue, 05 Sep 2023 09:10:47 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/KottGBRL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/RaschKF02,
  author       = {Robert Rasch and
                  Alexander Kott and
                  Kenneth D. Forbus},
  editor       = {Rina Dechter and
                  Michael J. Kearns and
                  Richard S. Sutton},
  title        = {{AI} on the Battlefield: An Experimental Exploration},
  booktitle    = {Proceedings of the Eighteenth National Conference on Artificial Intelligence
                  and Fourteenth Conference on Innovative Applications of Artificial
                  Intelligence, July 28 - August 1, 2002, Edmonton, Alberta, Canada},
  pages        = {906--912},
  publisher    = {{AAAI} Press / The {MIT} Press},
  year         = {2002},
  url          = {http://www.aaai.org/Library/AAAI/2002/aaai02-134.php},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/RaschKF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/KottHM01,
  author       = {Alexander Kott and
                  Paul Hubbard and
                  Michael Martin},
  title        = {Instability of distributed decision making in in command and control
                  systems},
  booktitle    = {American Control Conference, {ACC} 2001, Arlington, VA, USA, 25-27
                  June, 2001},
  pages        = {2743--2748},
  publisher    = {{IEEE}},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACC.2001.946300},
  doi          = {10.1109/ACC.2001.946300},
  timestamp    = {Wed, 05 Jan 2022 10:14:49 +0100},
  biburl       = {https://dblp.org/rec/conf/amcc/KottHM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aim/KottSM99,
  author       = {Alexander Kott and
                  Victor Saks and
                  Albert Mercer},
  title        = {A New Technique Enables Dynamic Replanning and Rescheduling of Aeromedical
                  Evacuation},
  journal      = {{AI} Mag.},
  volume       = {20},
  number       = {1},
  pages        = {43--53},
  year         = {1999},
  url          = {https://doi.org/10.1609/aimag.v20i1.1439},
  doi          = {10.1609/AIMAG.V20I1.1439},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aim/KottSM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/KottSM98,
  author       = {Alexander Kott and
                  Victor Saks and
                  Albert Mercer},
  editor       = {Jack Mostow and
                  Chuck Rich},
  title        = {A New Technique Enables Dynamic Replanning and Rescheduling of Aeromedical
                  Evacuation},
  booktitle    = {Proceedings of the Fifteenth National Conference on Artificial Intelligence
                  and Tenth Innovative Applications of Artificial Intelligence Conference,
                  {AAAI} 98, {IAAI} 98, July 26-30, 1998, Madison, Wisconsin, {USA}},
  pages        = {1063--1070},
  publisher    = {{AAAI} Press / The {MIT} Press},
  year         = {1998},
  url          = {http://www.aaai.org/Library/IAAI/1998/iaai98-008.php},
  timestamp    = {Tue, 05 Sep 2023 09:10:47 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/KottSM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/SaksBKK97,
  author       = {Victor Saks and
                  Gretchen Braidic and
                  Alexander Kott and
                  Corey Kirschner},
  editor       = {Eugene C. Freuder},
  title        = {Distributed Medical Evacuation Planning: What Problem Should Each
                  Agent Solve?},
  booktitle    = {Constraints {\&} Agents: Collected Papers from the 1997 {AAAI}
                  Workshop, Providence, RI, USA, July 27, 1997},
  pages        = {129--135},
  publisher    = {{AAAI} Press},
  year         = {1997},
  timestamp    = {Fri, 19 May 2023 15:58:09 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/SaksBKK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/expert/SathiFGK92,
  author       = {Neena Sathi and
                  Mark S. Fox and
                  Rajay Goyal and
                  Alexander S. Kott},
  title        = {Resource Configuration and Allocation-A Case Study of Constrained
                  Heuristic Search},
  journal      = {{IEEE} Expert},
  volume       = {7},
  number       = {2},
  pages        = {26--35},
  year         = {1992},
  url          = {https://doi.org/10.1109/64.129280},
  doi          = {10.1109/64.129280},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/expert/SathiFGK92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mitjsme/GadhHKK89,
  author       = {Rajit Gadh and
                  Donna Herbert and
                  Alexander Kott and
                  Charles P. Kollar},
  editor       = {Duvvuru Sriram and
                  Robert Logcher and
                  Shuichi Fukuda},
  title        = {Feature-Based Design for Manufacturability Critique in Concurrent
                  Engineering},
  booktitle    = {Computer-Aided Cooperative Product Development, {MIT-JSME} Workshop,
                  MIT, Cambridge, USA, November 20/21, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {492},
  pages        = {393--410},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/BFb0014288},
  doi          = {10.1007/BFB0014288},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/mitjsme/GadhHKK89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics