Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Alexander Kott
@article{DBLP:journals/cacm/LinkovLSPS0K23, author = {Igor Linkov and Alexandre K. Ligo and Kelsey Stoddard and Beatrice Perez and Andrew Strelzoff and Emanuele Bellini and Alexander Kott}, title = {Cyber Efficiency and Cyber Resilience}, journal = {Commun. {ACM}}, volume = {66}, number = {4}, pages = {33--37}, year = {2023}, url = {https://doi.org/10.1145/3549073}, doi = {10.1145/3549073}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/LinkovLSPS0K23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/WeismanKV23, author = {Michael J. Weisman and Alexander Kott and Joachim Vandekerckhove}, title = {Piecewise Linear and Stochastic Models for the Analysis of Cyber Resilience}, booktitle = {57th Annual Conference on Information Sciences and Systems, {CISS} 2023, Baltimore, MD, USA, March 22-24, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CISS56502.2023.10089725}, doi = {10.1109/CISS56502.2023.10089725}, timestamp = {Sat, 22 Apr 2023 16:25:53 +0200}, biburl = {https://dblp.org/rec/conf/ciss/WeismanKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/LinkovSSGKTKBT23, author = {Igor Linkov and Kelsey Stoddard and Andrew Strelzoff and Stephanie Elisabeth Galaitsi and Jeffrey M. Keisler and Benjamin D. Trump and Alexander Kott and Pavol Bielik and Petar Tsankov}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Toward Mission-Critical {AI:} Interpretable, Actionable, and Resilient {AI}}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {181--197}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10181349}, doi = {10.23919/CYCON58705.2023.10181349}, timestamp = {Mon, 31 Jul 2023 13:56:42 +0200}, biburl = {https://dblp.org/rec/conf/cycon/LinkovSSGKTKBT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/SunXSBKX23, author = {Zheyuan Sun and Maochao Xu and Kristin M. Schweitzer and Raymond M. Bateman and Alexander Kott and Shouhuai Xu}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Cyber Attacks Against Enterprise Networks: Characterization, Modeling and Forecasting}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {60--81}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_4}, doi = {10.1007/978-3-031-45933-7\_4}, timestamp = {Wed, 06 Dec 2023 13:43:04 +0100}, biburl = {https://dblp.org/rec/conf/scisec/SunXSBKX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-04413, author = {Alexander Kott and Michael J. Weisman and Joachim Vandekerckhove}, title = {Mathematical Modeling of Cyber Resilience}, journal = {CoRR}, volume = {abs/2302.04413}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.04413}, doi = {10.48550/ARXIV.2302.04413}, eprinttype = {arXiv}, eprint = {2302.04413}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-04413.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-04982, author = {Michael J. Weisman and Alexander Kott and Joachim Vandekerckhove}, title = {Piecewise Linear and Stochastic Models for the Analysis of Cyber Resilience}, journal = {CoRR}, volume = {abs/2302.04982}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.04982}, doi = {10.48550/ARXIV.2302.04982}, eprinttype = {arXiv}, eprint = {2302.04982}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-04982.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-07941, author = {Jason E. Ellis and Travis W. Parker and Joachim Vandekerckhove and Brian J. Murphy and Sidney C. Smith and Alexander Kott and Michael J. Weisman}, title = {An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience}, journal = {CoRR}, volume = {abs/2302.07941}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.07941}, doi = {10.48550/ARXIV.2302.07941}, eprinttype = {arXiv}, eprint = {2302.07941}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-07941.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-16307, author = {Michael J. Weisman and Alexander Kott and Jason E. Ellis and Brian J. Murphy and Travis W. Parker and Sidney C. Smith and Joachim Vandekerckhove}, title = {Quantitative Measurement of Cyber Resilience: Modeling and Experimentation}, journal = {CoRR}, volume = {abs/2303.16307}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.16307}, doi = {10.48550/ARXIV.2303.16307}, eprinttype = {arXiv}, eprint = {2303.16307}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-16307.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-12408, author = {Alexander Kott}, title = {Autonomous Intelligent Cyber-defense Agent: Introduction and Overview}, journal = {CoRR}, volume = {abs/2304.12408}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.12408}, doi = {10.48550/ARXIV.2304.12408}, eprinttype = {arXiv}, eprint = {2304.12408}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-12408.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/KottWV22, author = {Alexander Kott and Michael J. Weisman and Joachim Vandekerckhove}, title = {Mathematical Modeling of Cyber Resilience}, booktitle = {{IEEE} Military Communications Conference, {MILCOM} 2022, Rockville, MD, USA, November 28 - December 2, 2022}, pages = {849--854}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/MILCOM55135.2022.10017731}, doi = {10.1109/MILCOM55135.2022.10017731}, timestamp = {Wed, 08 Feb 2023 17:46:14 +0100}, biburl = {https://dblp.org/rec/conf/milcom/KottWV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/EllisPVMSKW22, author = {Jason E. Ellis and Travis W. Parker and Joachim Vandekerckhove and Brian J. Murphy and Sidney C. Smith and Alexander Kott and Michael J. Weisman}, title = {An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience}, booktitle = {{IEEE} Military Communications Conference, {MILCOM} 2022, Rockville, MD, USA, November 28 - December 2, 2022}, pages = {855--860}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/MILCOM55135.2022.10017529}, doi = {10.1109/MILCOM55135.2022.10017529}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/EllisPVMSKW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-11111, author = {Alexander Kott and Paul Th{\'{e}}ron}, title = {Doers, not Watchers: Intelligent Autonomous Agents are a Path to Cyber Resilience}, journal = {CoRR}, volume = {abs/2201.11111}, year = {2022}, url = {https://arxiv.org/abs/2201.11111}, eprinttype = {arXiv}, eprint = {2201.11111}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-11111.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-11117, author = {Stephanie Elisabeth Galaitsi and Benjamin D. Trump and Jeffrey M. Keisler and Igor Linkov and Alexander Kott}, title = {Cybertrust: From Explainable to Actionable and Interpretable {AI} {(AI2)}}, journal = {CoRR}, volume = {abs/2201.11117}, year = {2022}, url = {https://arxiv.org/abs/2201.11117}, eprinttype = {arXiv}, eprint = {2201.11117}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-11117.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-11148, author = {Alexandre K. Ligo and Alexander Kott and Igor Linkov}, title = {Autonomous Cyber Defense Introduces Risk: Can We Manage the Risk?}, journal = {CoRR}, volume = {abs/2201.11148}, year = {2022}, url = {https://arxiv.org/abs/2201.11148}, eprinttype = {arXiv}, eprint = {2201.11148}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-11148.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-11152, author = {Alexander Kott and Maureen S. Golan and Benjamin D. Trump and Igor Linkov}, title = {Cyber Resilience: by Design or by Intervention?}, journal = {CoRR}, volume = {abs/2201.11152}, year = {2022}, url = {https://arxiv.org/abs/2201.11152}, eprinttype = {arXiv}, eprint = {2201.11152}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-11152.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KottL21, author = {Alexander Kott and Igor Linkov}, title = {To Improve Cyber Resilience, Measure It}, journal = {Computer}, volume = {54}, number = {2}, pages = {80--85}, year = {2021}, url = {https://doi.org/10.1109/MC.2020.3038411}, doi = {10.1109/MC.2020.3038411}, timestamp = {Mon, 22 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/KottL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KottGTL21, author = {Alexander Kott and Maureen S. Golan and Benjamin D. Trump and Igor Linkov}, title = {Cyber Resilience: by Design or by Intervention?}, journal = {Computer}, volume = {54}, number = {8}, pages = {112--117}, year = {2021}, url = {https://doi.org/10.1109/MC.2021.3082836}, doi = {10.1109/MC.2021.3082836}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KottGTL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LigoKL21, author = {Alexandre K. Ligo and Alexander Kott and Igor Linkov}, title = {Autonomous Cyberdefense Introduces Risk: Can We Manage the Risk?}, journal = {Computer}, volume = {54}, number = {10}, pages = {106--110}, year = {2021}, url = {https://doi.org/10.1109/MC.2021.3099042}, doi = {10.1109/MC.2021.3099042}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LigoKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-00528, author = {Alexandre K. Ligo and Alexander Kott and Igor Linkov}, title = {How to Measure Cyber Resilience of an Autonomous Agent: Approaches and Challenges}, journal = {CoRR}, volume = {abs/2102.00528}, year = {2021}, url = {https://arxiv.org/abs/2102.00528}, eprinttype = {arXiv}, eprint = {2102.00528}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-00528.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-09455, author = {Alexander Kott and Igor Linkov}, title = {To Improve Cyber Resilience, Measure It}, journal = {CoRR}, volume = {abs/2102.09455}, year = {2021}, url = {https://arxiv.org/abs/2102.09455}, eprinttype = {arXiv}, eprint = {2102.09455}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-09455.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-11305, author = {Vinicius G. Goecks and Nicholas R. Waytowich and Derrik E. Asher and Song Jun Park and Mark R. Mittrick and John T. Richardson and Manuel Vindiola and Anne Logie and Mark Dennison and Theron Trout and Priya Narayanan and Alexander Kott}, title = {On games and simulators as a platform for development of artificial intelligence for command and control}, journal = {CoRR}, volume = {abs/2110.11305}, year = {2021}, url = {https://arxiv.org/abs/2110.11305}, eprinttype = {arXiv}, eprint = {2110.11305}, timestamp = {Thu, 28 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-11305.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LinkovGTKK20, author = {Igor Linkov and Stephanie Elisabeth Galaitsi and Benjamin D. Trump and Jeffrey M. Keisler and Alexander Kott}, title = {Cybertrust: From Explainable to Actionable and Interpretable Artificial Intelligence}, journal = {Computer}, volume = {53}, number = {9}, pages = {91--96}, year = {2020}, url = {https://doi.org/10.1109/MC.2020.2993623}, doi = {10.1109/MC.2020.2993623}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LinkovGTKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KottT20, author = {Alexander Kott and Paul Th{\'{e}}ron}, title = {Doers, Not Watchers: Intelligent Autonomous Agents Are a Path to Cyber Resilience}, journal = {{IEEE} Secur. Priv.}, volume = {18}, number = {3}, pages = {62--66}, year = {2020}, url = {https://doi.org/10.1109/MSEC.2020.2983714}, doi = {10.1109/MSEC.2020.2983714}, timestamp = {Tue, 09 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/KottT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/TheronKDRLPMG20, author = {Paul Th{\'{e}}ron and Alexander Kott and Martin Drasar and Krzysztof Rzadca and Beno{\^{\i}}t Leblanc and Mauno Pihelgas and Luigi V. Mancini and Fabio De Gaspari}, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems}, booktitle = {Adaptive Autonomous Secure Cyber Systems}, pages = {1--21}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1\_1}, doi = {10.1007/978-3-030-33432-1\_1}, timestamp = {Mon, 03 Jan 2022 21:52:41 +0100}, biburl = {https://dblp.org/rec/books/sp/20/TheronKDRLPMG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/TheronK19, author = {Paul Th{\'{e}}ron and Alexander Kott}, title = {When Autonomous Intelligent Goodware Will Fight Autonomous Intelligent Malware: {A} Possible Future of Cyber Defense}, booktitle = {2019 {IEEE} Military Communications Conference, {MILCOM} 2019, Norfolk, VA, USA, November 12-14, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/MILCOM47813.2019.9021038}, doi = {10.1109/MILCOM47813.2019.9021038}, timestamp = {Thu, 19 Mar 2020 08:47:16 +0100}, biburl = {https://dblp.org/rec/conf/milcom/TheronK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-04531, author = {Nandi O. Leslie and Richard E. Harang and Lawrence P. Knachel and Alexander Kott}, title = {Statistical Models for the Number of Successful Cyber Intrusions}, journal = {CoRR}, volume = {abs/1901.04531}, year = {2019}, url = {http://arxiv.org/abs/1901.04531}, eprinttype = {arXiv}, eprint = {1901.04531}, timestamp = {Fri, 01 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-04531.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-10086, author = {Alexander Kott and Ethan Stump}, title = {Intelligent Autonomous Things on the Battlefield}, journal = {CoRR}, volume = {abs/1902.10086}, year = {2019}, url = {http://arxiv.org/abs/1902.10086}, eprinttype = {arXiv}, eprint = {1902.10086}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-10086.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-05253, author = {Michael J. De Lucia and Allison Newcomb and Alexander Kott}, title = {Features and Operation of an Autonomous Agent for Cyber Defense}, journal = {CoRR}, volume = {abs/1905.05253}, year = {2019}, url = {http://arxiv.org/abs/1905.05253}, eprinttype = {arXiv}, eprint = {1905.05253}, timestamp = {Tue, 28 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-05253.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-01959, author = {Paul Th{\'{e}}ron and Alexander Kott}, title = {When Autonomous Intelligent Goodware will Fight Autonomous Intelligent Malware: {A} Possible Future of Cyber Defense}, journal = {CoRR}, volume = {abs/1912.01959}, year = {2019}, url = {http://arxiv.org/abs/1912.01959}, eprinttype = {arXiv}, eprint = {1912.01959}, timestamp = {Thu, 02 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-01959.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaaiss/Kott18, author = {Alexander Kott}, title = {Challenges and Characteristics of Intelligent Autonomy for Internet of Battle Things in Highly Adversarial Environments}, booktitle = {2018 {AAAI} Spring Symposia, Stanford University, Palo Alto, California, USA, March 26-28, 2018}, publisher = {{AAAI} Press}, year = {2018}, url = {https://aaai.org/ocs/index.php/SSS/SSS18/paper/view/17470}, timestamp = {Tue, 08 Jan 2019 14:37:15 +0100}, biburl = {https://dblp.org/rec/conf/aaaiss/Kott18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcis/TheronKDRLPMP18, author = {Paul Th{\'{e}}ron and Alexander Kott and Martin Drasar and Krzysztof Rzadca and Beno{\^{\i}}t LeBlanc and Mauno Pihelgas and Luigi V. Mancini and Agostino Panico}, title = {Towards an active, autonomous and intelligent cyber defense of military systems: The {NATO} {AICA} reference architecture}, booktitle = {International Conference on Military Communications and Information Systems, {ICMCIS} 2018, Warsaw, Poland, May 22-23, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICMCIS.2018.8398730}, doi = {10.1109/ICMCIS.2018.8398730}, timestamp = {Fri, 19 Apr 2024 13:06:13 +0200}, biburl = {https://dblp.org/rec/conf/icmcis/TheronKDRLPMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-10664, author = {Alexander Kott and Luigi V. Mancini and Paul Th{\'{e}}ron and Martin Drasar and Edlira Dushku and Heiko G{\"{u}}nther and Markus Kont and Beno{\^{\i}}t Leblanc and Agostino Panico and Mauno Pihelgas and Krzysztof Rzadca}, title = {Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense}, journal = {CoRR}, volume = {abs/1803.10664}, year = {2018}, url = {http://arxiv.org/abs/1803.10664}, eprinttype = {arXiv}, eprint = {1803.10664}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-10664.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-11256, author = {Alexander Kott}, title = {Challenges and Characteristics of Intelligent Autonomy for Internet of Battle Things in Highly Adversarial Environments}, journal = {CoRR}, volume = {abs/1803.11256}, year = {2018}, url = {http://arxiv.org/abs/1803.11256}, eprinttype = {arXiv}, eprint = {1803.11256}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-11256.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-07646, author = {Alexander Kott and Ryan Thomas and Martin Drasar and Markus Kont and Alexander Poylisher and Benjamin A. Blakely and Paul Th{\'{e}}ron and Nathaniel Evans and Nandi Leslie and Rajdeep Singh and Maria Rigaki and Shanchieh Jay Yang and Beno{\^{\i}}t Leblanc and Paul Losiewicz and Sylvain Hourlier and Misty K. Blowers and Hugh Harney and Gregory Wehner and Alessandro Guarino and Jana Kom{\'{a}}rkov{\'{a}} and James Rowell}, title = {Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization {(NATO)} Research Group {IST-152-RTG}}, journal = {CoRR}, volume = {abs/1804.07646}, year = {2018}, url = {http://arxiv.org/abs/1804.07646}, eprinttype = {arXiv}, eprint = {1804.07646}, timestamp = {Wed, 14 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-07646.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-07651, author = {Alexander Kott and Benjamin A. Blakely and Diane Henshel and Gregory Wehner and James Rowell and Nathaniel Evans and Luis Mu{\~{n}}oz{-}Gonz{\'{a}}lez and Nandi Leslie and Donald W. French and Donald Woodard and Kerry Krutilla and Amanda Joyce and Igor Linkov and Carmen Mas Machuca and Janos Sztipanovits and Hugh Harney and Dennis Kergl and Perri Nejib and Edward Yakabovicz and Steven Noel and Tim Dudman and Pierre Trepagnier and Sowdagar Badesha and Alfred M{\o}ller}, title = {Approaches to Enhancing Cyber Resilience: Report of the North Atlantic Treaty Organization {(NATO)} Workshop {IST-153}}, journal = {CoRR}, volume = {abs/1804.07651}, year = {2018}, url = {http://arxiv.org/abs/1804.07651}, eprinttype = {arXiv}, eprint = {1804.07651}, timestamp = {Wed, 14 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-07651.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-02852, author = {Igor Linkov and Alexander Kott}, title = {Fundamental Concepts of Cyber Resilience: Introduction and Overview}, journal = {CoRR}, volume = {abs/1806.02852}, year = {2018}, url = {http://arxiv.org/abs/1806.02852}, eprinttype = {arXiv}, eprint = {1806.02852}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-02852.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-08349, author = {Alessandro Oltramari and Alexander Kott}, title = {Towards a Reconceptualisation of Cyber Risk: An Empirical and Ontological Study}, journal = {CoRR}, volume = {abs/1806.08349}, year = {2018}, url = {http://arxiv.org/abs/1806.08349}, eprinttype = {arXiv}, eprint = {1806.08349}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-08349.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-08657, author = {Paul Th{\'{e}}ron and Alexander Kott and Martin Drasar and Krzysztof Rzadca and Beno{\^{\i}}t Leblanc and Mauno Pihelgas and Luigi V. Mancini and Agostino Panico}, title = {Towards an Active, Autonomous and Intelligent Cyber Defense of Military Systems: the {NATO} {AICA} Reference Architecture}, journal = {CoRR}, volume = {abs/1806.08657}, year = {2018}, url = {http://arxiv.org/abs/1806.08657}, eprinttype = {arXiv}, eprint = {1806.08657}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-08657.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-08339, author = {Alexander Kott and Philip Perconti}, title = {Long-Term Forecasts of Military Technologies for a 20-30 Year Horizon: An Empirical Assessment of Accuracy}, journal = {CoRR}, volume = {abs/1807.08339}, year = {2018}, url = {http://arxiv.org/abs/1807.08339}, eprinttype = {arXiv}, eprint = {1807.08339}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-08339.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-10808, author = {Edward Colbert and Alexander Kott and Lawrence P. Knachel}, title = {Game-Theoretic Model and Experimental Investigation of Cyber Wargaming}, journal = {CoRR}, volume = {abs/1809.10808}, year = {2018}, url = {http://arxiv.org/abs/1809.10808}, eprinttype = {arXiv}, eprint = {1809.10808}, timestamp = {Thu, 31 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-10808.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-08014, author = {Alexander Kott}, title = {Intelligent Autonomous Agents are Key to Cyber Defense of the Future Army Networks}, journal = {CoRR}, volume = {abs/1812.08014}, year = {2018}, url = {http://arxiv.org/abs/1812.08014}, eprinttype = {arXiv}, eprint = {1812.08014}, timestamp = {Wed, 02 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-08014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KottA17, author = {Alexander Kott and David S. Alberts}, title = {How Do You Command an Army of Intelligent Things?}, journal = {Computer}, volume = {50}, number = {12}, pages = {96--100}, year = {2017}, url = {https://doi.org/10.1109/MC.2017.4451205}, doi = {10.1109/MC.2017.4451205}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KottA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KottLL17, author = {Alexander Kott and Jackson Ludwig and Mona Lange}, title = {Assessing Mission Impact of Cyberattacks: Toward a Model-Driven Paradigm}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {5}, pages = {65--74}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.3681068}, doi = {10.1109/MSP.2017.3681068}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/KottLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HarangK17, author = {Richard E. Harang and Alexander Kott}, title = {Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {10}, pages = {2348--2359}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2705629}, doi = {10.1109/TIFS.2017.2705629}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HarangK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kott17, author = {Alexander Kott}, title = {Overview of Cyber Science and Technology Programs at the {U.S.} Army Research Laboratory}, journal = {CoRR}, volume = {abs/1702.04652}, year = {2017}, url = {http://arxiv.org/abs/1702.04652}, eprinttype = {arXiv}, eprint = {1702.04652}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kott17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LangeKBMBVMMM17, author = {Mona Lange and Alexander Kott and Noam Ben{-}Asher and Wim Mees and Nazife Baykal and Cristian{-}Mihai Vidu and Matteo Merialdo and Marek Malowidzki and Bhopinder Madahar}, title = {Recommendations for Model-Driven Paradigms for Integrated Approaches to Cyber Defense}, journal = {CoRR}, volume = {abs/1703.03306}, year = {2017}, url = {http://arxiv.org/abs/1703.03306}, eprinttype = {arXiv}, eprint = {1703.03306}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LangeKBMBVMMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HarangK17, author = {Richard E. Harang and Alexander Kott}, title = {Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach}, journal = {CoRR}, volume = {abs/1707.03927}, year = {2017}, url = {http://arxiv.org/abs/1707.03927}, eprinttype = {arXiv}, eprint = {1707.03927}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HarangK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-07424, author = {Edward J. M. Colbert and D. T. Sullivan and Alexander Kott}, title = {Cyber-Physical War Gaming}, journal = {CoRR}, volume = {abs/1708.07424}, year = {2017}, url = {http://arxiv.org/abs/1708.07424}, eprinttype = {arXiv}, eprint = {1708.07424}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-07424.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1710-04148, author = {Alexander Kott and Mona Lange and Jackson Ludwig}, title = {Approaches to Modeling the Impact of Cyber Attacks on a Mission}, journal = {CoRR}, volume = {abs/1710.04148}, year = {2017}, url = {http://arxiv.org/abs/1710.04148}, eprinttype = {arXiv}, eprint = {1710.04148}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-04148.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-08976, author = {Alexander Kott and David S. Alberts}, title = {How do you Command an Army of Intelligent Things?}, journal = {CoRR}, volume = {abs/1712.08976}, year = {2017}, url = {http://arxiv.org/abs/1712.08976}, eprinttype = {arXiv}, eprint = {1712.08976}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-08976.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-08980, author = {Alexander Kott and Ananthram Swami and Bruce J. West}, title = {The Internet of Battle Things}, journal = {CoRR}, volume = {abs/1712.08980}, year = {2017}, url = {http://arxiv.org/abs/1712.08980}, eprinttype = {arXiv}, eprint = {1712.08980}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-08980.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KottSW16, author = {Alexander Kott and Ananthram Swami and Bruce J. West}, title = {The Fog of War in Cyberspace}, journal = {Computer}, volume = {49}, number = {11}, pages = {84--87}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.333}, doi = {10.1109/MC.2016.333}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KottSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KottSW16a, author = {Alexander Kott and Ananthram Swami and Bruce J. West}, title = {The Internet of Battle Things}, journal = {Computer}, volume = {49}, number = {12}, pages = {70--75}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.355}, doi = {10.1109/MC.2016.355}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KottSW16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KottSBMSJLV16, author = {Alexander Kott and Nikolai T. Stoianov and Nazife Baykal and Alfred M{\o}ller and Reginald E. Sawilla and Pram Jain and Mona Lange and Cristian Vidu}, title = {Assessing Mission Impact of Cyberattacks: Report of the {NATO} {IST-128} Workshop}, journal = {CoRR}, volume = {abs/1601.00912}, year = {2016}, url = {http://arxiv.org/abs/1601.00912}, eprinttype = {arXiv}, eprint = {1601.00912}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/KottSBMSJLV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GroundKB16, author = {Larry Ground and Alexander Kott and Ray Budd}, title = {Coalition-based Planning of Military Operations: Adversarial Reasoning Algorithms in an Integrated Decision Aid}, journal = {CoRR}, volume = {abs/1601.06069}, year = {2016}, url = {http://arxiv.org/abs/1601.06069}, eprinttype = {arXiv}, eprint = {1601.06069}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GroundKB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KottBGRL16, author = {Alexander Kott and Ray Budd and Larry Ground and V. Lakshmi Rebbapragada and John Langston}, title = {Decision Aids for Adversarial Planning in Military Operations: Algorithms, Tools, and Turing-test-like Experimental Validation}, journal = {CoRR}, volume = {abs/1601.06108}, year = {2016}, url = {http://arxiv.org/abs/1601.06108}, eprinttype = {arXiv}, eprint = {1601.06108}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KottBGRL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KottA16, author = {Alexander Kott and Tarek F. Abdelzaher}, title = {Resiliency and Robustness of Complex, Multi-Genre Networks}, journal = {CoRR}, volume = {abs/1601.06731}, year = {2016}, url = {http://arxiv.org/abs/1601.06731}, eprinttype = {arXiv}, eprint = {1601.06731}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KottA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KottS16, author = {Alexander Kott and Bruce Skarin}, title = {Approaches to Modeling Insurgency}, journal = {CoRR}, volume = {abs/1603.01787}, year = {2016}, url = {http://arxiv.org/abs/1603.01787}, eprinttype = {arXiv}, eprint = {1603.01787}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KottS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/YoungK16, author = {Stuart Young and Alexander Kott}, title = {A Survey of Research on Control of Teams of Small Robots in Military Operations}, journal = {CoRR}, volume = {abs/1606.01288}, year = {2016}, url = {http://arxiv.org/abs/1606.01288}, eprinttype = {arXiv}, eprint = {1606.01288}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/YoungK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KottM16, author = {Alexander Kott and Stephen Morse}, title = {The Role of {PMESII} Modeling in a Continuous Cycle of Anticipation and Action}, journal = {CoRR}, volume = {abs/1607.06515}, year = {2016}, url = {http://arxiv.org/abs/1607.06515}, eprinttype = {arXiv}, eprint = {1607.06515}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KottM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/OwnbyK16, author = {Michael Ownby and Alexander Kott}, title = {Predicting Enemy's Actions Improves Commander Decision-Making}, journal = {CoRR}, volume = {abs/1607.06759}, year = {2016}, url = {http://arxiv.org/abs/1607.06759}, eprinttype = {arXiv}, eprint = {1607.06759}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/OwnbyK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KottM16a, author = {Alexander Kott and Wes Milks}, title = {Validation of Information Fusion}, journal = {CoRR}, volume = {abs/1607.07288}, year = {2016}, url = {http://arxiv.org/abs/1607.07288}, eprinttype = {arXiv}, eprint = {1607.07288}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KottM16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HubbardKM16, author = {Paul Hubbard and Alexander Kott and Michael Martin}, title = {Inducing and Mitigating a Self-Reinforcing Degradation in Decision-making Teams}, journal = {CoRR}, volume = {abs/1607.08139}, year = {2016}, url = {http://arxiv.org/abs/1607.08139}, eprinttype = {arXiv}, eprint = {1607.08139}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HubbardKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BlowersICK16, author = {Misty K. Blowers and Jose Iribarne and Edward Colbert and Alexander Kott}, title = {The Future Internet of Things and Security of its Control Systems}, journal = {CoRR}, volume = {abs/1610.01953}, year = {2016}, url = {http://arxiv.org/abs/1610.01953}, eprinttype = {arXiv}, eprint = {1610.01953}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BlowersICK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KottAW15, author = {Alexander Kott and David S. Alberts and Cliff Wang}, title = {Will Cybersecurity Dictate the Outcome of Future Wars?}, journal = {Computer}, volume = {48}, number = {12}, pages = {98--101}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.359}, doi = {10.1109/MC.2015.359}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KottAW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KottSM15, author = {Alexander Kott and Ananthram Swami and Patrick D. McDaniel}, title = {Six Potential Game-Changers in Cyber Security: Towards Priorities in Cyber Science and Engineering}, journal = {CoRR}, volume = {abs/1511.00509}, year = {2015}, url = {http://arxiv.org/abs/1511.00509}, eprinttype = {arXiv}, eprint = {1511.00509}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KottSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KottBS15, author = {Alexander Kott and Norbou Buchler and Kristin E. Schaefer}, title = {Kinetic and Cyber}, journal = {CoRR}, volume = {abs/1511.03531}, year = {2015}, url = {http://arxiv.org/abs/1511.03531}, eprinttype = {arXiv}, eprint = {1511.03531}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KottBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KottAW15, author = {Alexander Kott and David S. Alberts and Cliff Wang}, title = {War of 2050: a Battle for Information, Communications, and Computer Security}, journal = {CoRR}, volume = {abs/1512.00360}, year = {2015}, url = {http://arxiv.org/abs/1512.00360}, eprinttype = {arXiv}, eprint = {1512.00360}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KottAW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kott15, author = {Alexander Kott}, title = {Science of Cyber Security as a System of Models and Problems}, journal = {CoRR}, volume = {abs/1512.00407}, year = {2015}, url = {http://arxiv.org/abs/1512.00407}, eprinttype = {arXiv}, eprint = {1512.00407}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kott15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KottA15, author = {Alexander Kott and Curtis Arnold}, title = {Towards Approaches to Continuous Assessment of Cyber Risk in Security of Computer Networks}, journal = {CoRR}, volume = {abs/1512.07937}, year = {2015}, url = {http://arxiv.org/abs/1512.07937}, eprinttype = {arXiv}, eprint = {1512.07937}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KottA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KottHWC15, author = {Alexander Kott and Jeff Hansberger and Edward Waltz and Peter Corpac}, title = {An Experimental Evaluation of Computational Techniques for Planning and Assessment of International Interventions}, journal = {CoRR}, volume = {abs/1512.07941}, year = {2015}, url = {http://arxiv.org/abs/1512.07941}, eprinttype = {arXiv}, eprint = {1512.07941}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KottHWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KottO15, author = {Alexander Kott and Michael Ownby}, title = {Toward a Research Agenda in Adversarial Reasoning: Computational Approaches to Anticipating the Opponent's Intent and Actions}, journal = {CoRR}, volume = {abs/1512.07943}, year = {2015}, url = {http://arxiv.org/abs/1512.07943}, eprinttype = {arXiv}, eprint = {1512.07943}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KottO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CollierPGKL15, author = {Zachary A. Collier and Mahesh Panwar and Alexander A. Ganin and Alexander Kott and Igor Linkov}, title = {Security Metrics in Industrial Control Systems}, journal = {CoRR}, volume = {abs/1512.08515}, year = {2015}, url = {http://arxiv.org/abs/1512.08515}, eprinttype = {arXiv}, eprint = {1512.08515}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CollierPGKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KottSM14, author = {Alexander Kott and Ananthram Swami and Patrick D. McDaniel}, title = {Security Outlook: Six Cyber Game Changers for the Next 15 Years}, journal = {Computer}, volume = {47}, number = {12}, pages = {104--106}, year = {2014}, url = {https://doi.org/10.1109/MC.2014.366}, doi = {10.1109/MC.2014.366}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KottSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/McDanielJPPWKMS14, author = {Patrick D. McDaniel and Trent Jaeger and Thomas F. La Porta and Nicolas Papernot and Robert J. Walls and Alexander Kott and Lisa M. Marvel and Ananthram Swami and Prasant Mohapatra and Srikanth V. Krishnamurthy and Iulian Neamtiu}, editor = {Sushil Jajodia and Kun Sun}, title = {Security and Science of Agility}, booktitle = {Proceedings of the First {ACM} Workshop on Moving Target Defense, {MTD} '14, Scottsdale, Arizona, USA, November 7, 2014}, pages = {13--19}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663474.2663476}, doi = {10.1145/2663474.2663476}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/McDanielJPPWKMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/crc/14/KottA14, author = {Alexander Kott and Tarek F. Abdelzaher}, editor = {Niranjan Suri and Giacomo Cabri}, title = {Resiliency and Robustness of Complex Systems and Networks}, booktitle = {Adaptive, Dynamic, and Resilient Systems}, series = {Mobile Services and Systems Series}, pages = {67--86}, publisher = {{CRC} Press}, year = {2014}, timestamp = {Thu, 04 Jun 2020 17:40:00 +0200}, biburl = {https://dblp.org/rec/books/crc/14/KottA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Kott14, author = {Alexander Kott}, editor = {Robinson E. Pino}, title = {Towards Fundamental Science of Cyber Security}, booktitle = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, pages = {1--13}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2\_1}, doi = {10.1007/978-1-4614-7597-2\_1}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/Kott14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KottWE14, author = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Preview}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {1--5}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_1}, doi = {10.1007/978-3-319-11391-3\_1}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/KottWE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/PinoK14, author = {Robinson E. Pino and Alexander Kott}, editor = {Robinson E. Pino and Alexander Kott and Michael J. Shevenell}, title = {Neuromorphic Computing for Cognitive Augmentation in Cyber Defense}, booktitle = {Cybersecurity Systems for Human Cognition Augmentation}, series = {Advances in Information Security}, volume = {61}, pages = {19--45}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10374-7\_2}, doi = {10.1007/978-3-319-10374-7\_2}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/PinoK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KottBS14, author = {Alexander Kott and Norbou Buchler and Kristin E. Schaefer}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Kinetic and Cyber}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {29--45}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_3}, doi = {10.1007/978-3-319-11391-3\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KottBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KottWE14a, author = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Concluding Thoughts}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {323--328}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_15}, doi = {10.1007/978-3-319-11391-3\_15}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KottWE14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/61, editor = {Robinson E. Pino and Alexander Kott and Michael J. Shevenell}, title = {Cybersecurity Systems for Human Cognition Augmentation}, series = {Advances in Information Security}, volume = {61}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10374-7}, doi = {10.1007/978-3-319-10374-7}, isbn = {978-3-319-10373-0}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/61.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/62, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3}, doi = {10.1007/978-3-319-11391-3}, isbn = {978-3-319-11390-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/62.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KottA13, author = {Alexander Kott and Curtis Arnold}, title = {The Promises and Challenges of Continuous Monitoring and Risk Scoring}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {1}, pages = {90--93}, year = {2013}, url = {https://doi.org/10.1109/MSP.2013.19}, doi = {10.1109/MSP.2013.19}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/KottA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/KottSMM11, author = {Alexander Kott and Rajdeep Singh and William M. McEneaney and Wes Milks}, title = {Hypothesis-driven information fusion in adversarial, deceptive environments}, journal = {Inf. Fusion}, volume = {12}, number = {2}, pages = {131--144}, year = {2011}, url = {https://doi.org/10.1016/j.inffus.2010.09.001}, doi = {10.1016/J.INFFUS.2010.09.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inffus/KottSMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fusion/KottM09, author = {Alexander Kott and Wes Milks}, title = {Approaches to validation of information fusion systems}, booktitle = {12th International Conference on Information Fusion, {FUSION} '09, Seattle, Washington, USA, July 6-9, 2009}, pages = {882--889}, publisher = {{IEEE}}, year = {2009}, url = {https://ieeexplore.ieee.org/document/5203626/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fusion/KottM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/KottBGRL05, author = {Alexander Kott and Ray Budd and Larry Ground and V. Lakshmi Rebbapragada and John Langston}, title = {Building a Tool for Battle Planning: Challenges, Tradeoffs, and Experimental Findings}, journal = {Appl. Intell.}, volume = {23}, number = {3}, pages = {165--189}, year = {2005}, url = {https://doi.org/10.1007/s10489-005-4606-z}, doi = {10.1007/S10489-005-4606-Z}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/apin/KottBGRL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/expert/RaschKF03, author = {Robert Rasch and Alexander Kott and Kenneth D. Forbus}, title = {Incorporating {AI} into Military Decision Making: An Experiment}, journal = {{IEEE} Intell. Syst.}, volume = {18}, number = {4}, pages = {18--26}, year = {2003}, url = {https://doi.org/10.1109/MIS.2003.1217624}, doi = {10.1109/MIS.2003.1217624}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/expert/RaschKF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/KottGBRL02, author = {Alexander Kott and Larry Ground and Ray Budd and V. Lakshmi Rebbapragada and John Langston}, editor = {Rina Dechter and Michael J. Kearns and Richard S. Sutton}, title = {Toward Practical Knowledge-Based Tools for Battle Planning and Scheduling}, booktitle = {Proceedings of the Eighteenth National Conference on Artificial Intelligence and Fourteenth Conference on Innovative Applications of Artificial Intelligence, July 28 - August 1, 2002, Edmonton, Alberta, Canada}, pages = {894--899}, publisher = {{AAAI} Press / The {MIT} Press}, year = {2002}, url = {http://www.aaai.org/Library/AAAI/2002/aaai02-132.php}, timestamp = {Tue, 05 Sep 2023 09:10:47 +0200}, biburl = {https://dblp.org/rec/conf/aaai/KottGBRL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/RaschKF02, author = {Robert Rasch and Alexander Kott and Kenneth D. Forbus}, editor = {Rina Dechter and Michael J. Kearns and Richard S. Sutton}, title = {{AI} on the Battlefield: An Experimental Exploration}, booktitle = {Proceedings of the Eighteenth National Conference on Artificial Intelligence and Fourteenth Conference on Innovative Applications of Artificial Intelligence, July 28 - August 1, 2002, Edmonton, Alberta, Canada}, pages = {906--912}, publisher = {{AAAI} Press / The {MIT} Press}, year = {2002}, url = {http://www.aaai.org/Library/AAAI/2002/aaai02-134.php}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/RaschKF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/KottHM01, author = {Alexander Kott and Paul Hubbard and Michael Martin}, title = {Instability of distributed decision making in in command and control systems}, booktitle = {American Control Conference, {ACC} 2001, Arlington, VA, USA, 25-27 June, 2001}, pages = {2743--2748}, publisher = {{IEEE}}, year = {2001}, url = {https://doi.org/10.1109/ACC.2001.946300}, doi = {10.1109/ACC.2001.946300}, timestamp = {Wed, 05 Jan 2022 10:14:49 +0100}, biburl = {https://dblp.org/rec/conf/amcc/KottHM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aim/KottSM99, author = {Alexander Kott and Victor Saks and Albert Mercer}, title = {A New Technique Enables Dynamic Replanning and Rescheduling of Aeromedical Evacuation}, journal = {{AI} Mag.}, volume = {20}, number = {1}, pages = {43--53}, year = {1999}, url = {https://doi.org/10.1609/aimag.v20i1.1439}, doi = {10.1609/AIMAG.V20I1.1439}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aim/KottSM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/KottSM98, author = {Alexander Kott and Victor Saks and Albert Mercer}, editor = {Jack Mostow and Chuck Rich}, title = {A New Technique Enables Dynamic Replanning and Rescheduling of Aeromedical Evacuation}, booktitle = {Proceedings of the Fifteenth National Conference on Artificial Intelligence and Tenth Innovative Applications of Artificial Intelligence Conference, {AAAI} 98, {IAAI} 98, July 26-30, 1998, Madison, Wisconsin, {USA}}, pages = {1063--1070}, publisher = {{AAAI} Press / The {MIT} Press}, year = {1998}, url = {http://www.aaai.org/Library/IAAI/1998/iaai98-008.php}, timestamp = {Tue, 05 Sep 2023 09:10:47 +0200}, biburl = {https://dblp.org/rec/conf/aaai/KottSM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/SaksBKK97, author = {Victor Saks and Gretchen Braidic and Alexander Kott and Corey Kirschner}, editor = {Eugene C. Freuder}, title = {Distributed Medical Evacuation Planning: What Problem Should Each Agent Solve?}, booktitle = {Constraints {\&} Agents: Collected Papers from the 1997 {AAAI} Workshop, Providence, RI, USA, July 27, 1997}, pages = {129--135}, publisher = {{AAAI} Press}, year = {1997}, timestamp = {Fri, 19 May 2023 15:58:09 +0200}, biburl = {https://dblp.org/rec/conf/aaai/SaksBKK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/expert/SathiFGK92, author = {Neena Sathi and Mark S. Fox and Rajay Goyal and Alexander S. Kott}, title = {Resource Configuration and Allocation-A Case Study of Constrained Heuristic Search}, journal = {{IEEE} Expert}, volume = {7}, number = {2}, pages = {26--35}, year = {1992}, url = {https://doi.org/10.1109/64.129280}, doi = {10.1109/64.129280}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/expert/SathiFGK92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mitjsme/GadhHKK89, author = {Rajit Gadh and Donna Herbert and Alexander Kott and Charles P. Kollar}, editor = {Duvvuru Sriram and Robert Logcher and Shuichi Fukuda}, title = {Feature-Based Design for Manufacturability Critique in Concurrent Engineering}, booktitle = {Computer-Aided Cooperative Product Development, {MIT-JSME} Workshop, MIT, Cambridge, USA, November 20/21, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {492}, pages = {393--410}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/BFb0014288}, doi = {10.1007/BFB0014288}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/mitjsme/GadhHKK89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.