Abstract is missing.
- Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military SystemsPaul Théron, Alexander Kott, Martin Drasar, Krzysztof Rzadca, Benoît Leblanc, Mauno Pihelgas, Luigi V. Mancini, Fabio De Gaspari. 1-21 [doi]
- Defending Against Machine Learning Based Inference Attacks via Adversarial Examples: Opportunities and ChallengesJinyuan Jia, Neil Zhenqiang Gong. 23-40 [doi]
- Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber DefenseErik Hemberg, Linda Zhang, Una-May O'Reilly. 41-61 [doi]
- Can Cyber Operations Be Made Autonomous? An Answer from the Situational Awareness ViewpointChen Zhong, John Yen, Peng Liu. 63-88 [doi]
- A Framework for Studying Autonomic Computing Models in Cyber DeceptionSridhar Venkatesan, Shridatt Sugrim, Jason A. Youzwak, Cho-Yu Jason Chiang, Ritu Chadha. 89-107 [doi]
- Autonomous Security Mechanisms for High-Performance Computing Systems: Review and AnalysisTao Hou, Tao Wang, Dakun Shen, Zhuo Lu, Yao Liu. 109-129 [doi]
- Automated Cyber Risk Mitigation: Making Informed Cost-Effective DecisionsMohammed Noraden Alsaleh, Ehab Al-Shaer. 131-157 [doi]
- Plan Interdiction GamesYevgeniy Vorobeychik, Michael Pritchard. 159-182 [doi]
- Game Theoretic Cyber Deception to Foil Adversarial Network ReconnaissanceAaron Schlenker, Omkar Thakoor, Haifeng Xu, Fei Fang, Milind Tambe, Phebe Vayanos. 183-204 [doi]
- Strategic Learning for Active, Adaptive, and Autonomous Cyber DefenseLinan Huang, Quanyan Zhu. 205-230 [doi]
- Online Learning Methods for Controlling Dynamic Cyber Deception StrategiesMarcus Gutierrez, Christopher Kiekintveld. 231-251 [doi]
- Phishing URL Detection with Lexical Features and Blacklisted DomainsJiwon Hong, Taeri Kim, Jing Liu 0024, Noseong Park, Sang-Wook Kim. 253-267 [doi]
- An Empirical Study of Secret Security Patch in Open Source SoftwareXinda Wang, Kun Sun 0001, Archer L. Batcheller, Sushil Jajodia. 269-289 [doi]