Follow
Michal M. Shlapentokh-Rothman
Title
Cited by
Cited by
Year
Linking threat tactics, techniques, and patterns with defensive weaknesses, vulnerabilities and affected platform configurations for cyber hunting
E Hemberg, J Kelly, M Shlapentokh-Rothman, B Reinstadler, K Xu, ...
arXiv preprint arXiv:2010.00533, 2020
502020
Language agent tree search unifies reasoning acting and planning in language models
A Zhou, K Yan, M Shlapentokh-Rothman, H Wang, YX Wang
arXiv preprint arXiv:2310.04406, 2023
232023
Learning curves for analysis of deep networks
D Hoiem, T Gupta, Z Li, M Shlapentokh-Rothman
International conference on machine learning, 4287-4296, 2021
212021
Coevolutionary modeling of cyber attack patterns and mitigations using public datasets
M Shlapentokh-Rothman, J Kelly, A Baral, E Hemberg, UM O'Reilly
Proceedings of the Genetic and Evolutionary Computation Conference, 714-722, 2021
102021
Securing the software defined perimeter with evolutionary co-optimization
M Shlapentokh-Rothman, E Hemberg, UM O'Reilly
Proceedings of the 2020 Genetic and Evolutionary Computation Conference …, 2020
82020
Unifying public threat knowledge for cyber hunting
M Shlapentokh-Rothman
Massachusetts Institute of Technology, 2020
22020
Webwise: Web interface control and sequential exploration with large language models
H Tao, S TV, M Shlapentokh-Rothman, D Hoiem, H Ji
arXiv preprint arXiv:2310.16042, 2023
12023
Region-Based Representations Revisited
M Shlapentokh-Rothman, A Blume, Y Xiao, Y Wu, S TV, H Tao, JY Lee, ...
arXiv preprint arXiv:2402.02352, 2024
2024
Bron-linking attack tactics, techniques, and patterns with defensive weaknesses, vulnerabilities and affected platform configurations
E Hemberg, J Kelly, M Shlapentokh-Rothman, B Reinstadler, K Xu, ...
arXiv preprint arXiv:2010.00533, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–9