Search

Your search keyword '"Kott, Alexander"' showing total 459 results

Search Constraints

Start Over You searched for: Author "Kott, Alexander" Remove constraint Author: "Kott, Alexander"
459 results on '"Kott, Alexander"'

Search Results

1. Russian Cyber Onslaught was Blunted by Ukrainian Cyber Resilience, not Merely Security

2. Autonomous Intelligent Cyber-defense Agent: Introduction and Overview

3. Quantitative Measurement of Cyber Resilience: Modeling and Experimentation

4. An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience

5. Piecewise Linear and Stochastic Models for the Analysis of Cyber Resilience

6. Mathematical Modeling of Cyber Resilience

7. Piecewise Linear and Stochastic Models for the Analysis of Cyber Resilience

8. Mathematical Modeling of Cyber Resilience

9. An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience

10. Cyber Resilience: by Design or by Intervention?

11. Autonomous Cyber Defense Introduces Risk: Can We Manage the Risk?

12. Cybertrust: From Explainable to Actionable and Interpretable AI (AI2)

13. Doers, not Watchers: Intelligent Autonomous Agents are a Path to Cyber Resilience

14. Risk Management

15. On games and simulators as a platform for development of artificial intelligence for command and control

16. To Improve Cyber Resilience, Measure It

17. How to Measure Cyber Resilience of an Autonomous Agent: Approaches and Challenges

18. Cyber Attacks Against Enterprise Networks: Characterization, Modeling and Forecasting

19. Human Intuition and Algorithmic Efficiency Must Be Balanced to Enhance Data Mesh Resilience.

20. When Autonomous Intelligent Goodware will Fight Autonomous Intelligent Malware: A Possible Future of Cyber Defense

21. Discovering a Regularity: the Case of An 800-year Law of Advances in Small-Arms Technologies

22. Features and Operation of an Autonomous Agent for Cyber Defense

23. Intelligent Autonomous Things on the Battlefield

24. Statistical Models for the Number of Successful Cyber Intrusions

25. Intelligent Autonomous Agents are Key to Cyber Defense of the Future Army Networks

27. Game-Theoretic Model and Experimental Investigation of Cyber Wargaming

28. Long-Term Forecasts of Military Technologies for a 20-30 Year Horizon: An Empirical Assessment of Accuracy

29. Towards a Reconceptualisation of Cyber Risk: An Empirical and Ontological Study

30. Towards an Active, Autonomous and Intelligent Cyber Defense of Military Systems: the NATO AICA Reference Architecture

31. Fundamental Concepts of Cyber Resilience: Introduction and Overview

32. Approaches to Enhancing Cyber Resilience: Report of the North Atlantic Treaty Organization (NATO) Workshop IST-153

33. Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG

34. Autonomous Intelligent Cyber-defense Agent (AICA) Reference Architecture. Release 2.0

35. Challenges and Characteristics of Intelligent Autonomy for Internet of Battle Things in Highly Adversarial Environments

36. The Internet of Battle Things

37. How do you Command an Army of Intelligent Things?

38. Approaches to Modeling the Impact of Cyber Attacks on a Mission

39. Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach

40. Recommendations for Model-Driven Paradigms for Integrated Approaches to Cyber Defense

41. Overview of Cyber Science and Technology Programs at the U.S. Army Research Laboratory

44. The Future Internet of Things and Security of its Control Systems

45. Inducing and Mitigating a Self-Reinforcing Degradation in Decision-making Teams

46. Validation of Information Fusion

47. Predicting Enemy's Actions Improves Commander Decision-Making

48. The Role of PMESII Modeling in a Continuous Cycle of Anticipation and Action

49. A Survey of Research on Control of Teams of Small Robots in Military Operations

50. Approaches to Modeling Insurgency

Catalog

Books, media, physical & digital resources