Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyber Hunting E Hemberg, J Kelly, M Shlapentokh-Rothman, B Reinstadler, K Xu, ... arXiv preprint arXiv:2010.00533, 2020 | 22 | 2020 |
Learning Curves for Analysis of Deep Networks D Hoiem, T Gupta, Z Li, M Shlapentokh-Rothman International Conference on Machine Learning, 4287-4296, 2021 | 13 | 2021 |
Coevolutionary modeling of cyber attack patterns and mitigations using public datasets M Shlapentokh-Rothman, J Kelly, A Baral, E Hemberg, UM O'Reilly Proceedings of the Genetic and Evolutionary Computation Conference, 714-722, 2021 | 6 | 2021 |
Securing the software defined perimeter with evolutionary co-optimization M Shlapentokh-Rothman, E Hemberg, UM O'Reilly Proceedings of the 2020 Genetic and Evolutionary Computation Conference …, 2020 | 4 | 2020 |
Unifying public threat knowledge for cyber hunting M Shlapentokh-Rothman Massachusetts Institute of Technology, 2020 | 2 | 2020 |
Bron-linking attack tactics, techniques, and patterns with defensive weaknesses, vulnerabilities and affected platform configurations E Hemberg, J Kelly, M Shlapentokh-Rothman, B Reinstadler, K Xu, ... arXiv preprint arXiv:2010.00533, 2020 | | 2020 |