Nandi Leslie
Nandi Leslie
Principal Technical Fellow, RTX
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Species-area curves, spatial aggregation, and habitat specialization in tropical forests
JB Plotkin, MD Potts, N Leslie, N Manokaran, J LaFrankie, PS Ashton
Journal of theoretical biology 207 (1), 81-99, 2000
Generative adversarial attacks against intrusion detection systems using active learning
D Shu, NO Leslie, CA Kamhoua, CS Tucker
Proceedings of the 2nd ACM workshop on wireless security and machine …, 2020
Honeypot allocation over attack graphs in cyber deception games
AH Anwar, C Kamhoua, N Leslie
2020 International Conference on Computing, Networking and Communications …, 2020
Statistical models for the number of successful cyber intrusions
NO Leslie, RE Harang, LP Knachel, A Kott
The Journal of Defense Modeling and Simulation 15 (1), 49-63, 2018
Harnessing the power of deception in attack graph-based security games
S Milani, W Shen, KS Chan, S Venkatesan, NO Leslie, C Kamhoua, ...
Decision and Game Theory for Security: 11th International Conference …, 2020
Machine learning raw network traffic detection
MJ De Lucia, PE Maxwell, ND Bastian, A Swami, B Jalaian, N Leslie
Artificial Intelligence and Machine Learning for Multi-Domain Operations …, 2021
Pareto gan: Extending the representational power of gans to heavy-tailed distributions
T Huster, J Cohen, Z Lin, K Chan, C Kamhoua, NO Leslie, CYJ Chiang, ...
International Conference on Machine Learning, 4523-4532, 2021
Deceptive labeling: hypergames on graphs for stealthy deception
AN Kulkarni, H Luo, NO Leslie, CA Kamhoua, J Fu
IEEE Control Systems Letters 5 (3), 977-982, 2020
Approaches to enhancing cyber resilience: Report of the north atlantic treaty organization (NATO) workshop IST-153
A Kott, B Blakely, D Henshel, G Wehner, J Rowell, N Evans, ...
arXiv preprint arXiv:1804.07651, 2018
Cybersecurity deception experimentation system
JC Acosta, A Basak, C Kiekintveld, N Leslie, C Kamhoua
2020 IEEE Secure Development (SecDev), 34-40, 2020
An unsupervised learning approach for in-vehicle network intrusion detection
N Leslie
2021 55th Annual Conference on Information Sciences and Systems (CISS), 1-4, 2021
A game-theoretic framework for dynamic cyber deception in internet of battlefield things
AH Anwar, C Kamhoua, N Leslie
Proceedings of the 16th EAI International Conference on Mobile and …, 2019
Learning and Planning in Feature Deception Games
ZR Shi, AD Procaccia, KS Chan, S Venkatesan, N Ben-Asher, NO Leslie, ...
arXiv preprint arXiv:1905.04833, 2019
Honeypot allocation for cyber deception under uncertainty
AH Anwar, CA Kamhoua, NO Leslie, C Kiekintveld
IEEE Transactions on Network and Service Management 19 (3), 3438-3452, 2022
Mitigation of Jamming Attacks via Deception
S Nan, S Brahma, CA Kamhoua, NO Leslie
2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile …, 2020
Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables
SY Ji, BK Jeong, C Kamhoua, N Leslie, DH Jeong
Journal of Network and Computer Applications 203, 103392, 2022
Raregan: Generating samples for rare classes
Z Lin, H Liang, G Fanti, V Sekar
Proceedings of the AAAI Conference on Artificial Intelligence 36 (7), 7506-7515, 2022
Moving target defense for in-vehicle software-defined networking: IP shuffling in network slicing with multiagent deep reinforcement learning
S Yoon, JH Cho, DS Kim, TJ Moore, FF Nelson, H Lim, N Leslie, ...
Artificial Intelligence and Machine Learning for Multi-Domain Operations …, 2020
Decoy allocation games on graphs with temporal logic objectives
AN Kulkarni, J Fu, H Luo, CA Kamhoua, NO Leslie
International Conference on Decision and Game Theory for Security, 168-187, 2020
Toward intelligent autonomous agents for cyber defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG
A Kott, R Thomas, M Drašar, M Kont, A Poylisher, B Blakely, P Theron, ...
arXiv preprint arXiv:1804.07646, 2018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20