Adaptive use of network-centric mechanisms in cyber-defense M Atighetchi, P Pal, F Webber, C Jones Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed …, 2003 | 172 | 2003 |
The intelligent home testbed V Lesser, M Atighetchi, B Benyo, B Horling, A Raja, R Vincent, T Wagner, ... environment 2, 15, 1999 | 135 | 1999 |
Use of machine learning in big data analytics for insider threat detection M Mayhew, M Atighetchi, A Adler, R Greenstadt MILCOM 2015-2015 IEEE Military Communications Conference, 915-922, 2015 | 107 | 2015 |
Packaging quality of service control behaviors for reuse R Schantz, J Loyall, M Atighetchi, P Pal Proceedings Fifth IEEE International Symposium on Object-Oriented Real-Time …, 2002 | 92 | 2002 |
Integrated adaptive qos management in middleware: A case study CD Gill, JP Loyall, RE Schantz, M Atighetch, JM Gossett, D Gorman, ... Proceedings. RTAS 2004. 10th IEEE Real-Time and Embedded Technology and …, 2004 | 89 | 2004 |
Comparing and contrasting adaptive middleware support in wide-area and embedded distributed object applications J Loyall, R Schantz, J Zinky, P Pal, R Shapiro, C Rodrigues, M Atighetchi, ... Proceedings 21st International Conference on Distributed Computing Systems …, 2001 | 87 | 2001 |
A multi-agent system for intelligent environment control V Lesser, M Atighetchi, B Benyo, B Horling, A Raja, R Vincent, T Wagner, ... Proceedings of the Third International Conference on Autonomous Agents 10 …, 1999 | 81 | 1999 |
Adaptive cyberdefense for survival and intrusion tolerance M Atighetchi, P Pal, F Webber, R Schantz, C Jones, J Loyall IEEE Internet Computing 8 (6), 25-33, 2004 | 64 | 2004 |
Intrusion tolerance approaches in ITUA M Cukier, J Lyons, P Pandey, HGV Ramasamy, WH Sanders, P Pal, ... Supplement of the 2001 International Conference on Dependable Systems and …, 2001 | 52 | 2001 |
The UMASS intelligent home project V Lesser, M Atighetchi, B Benyo, B Horling, A Raja, R Vincent, T Wagner, ... Proceedings of the third annual conference on Autonomous Agents, 291-298, 1999 | 52 | 1999 |
A Randomized ANOVA Procedure for Comparing Performance Curves. JH Piater, PR Cohen, X Zhang, M Atighetchi ICML 98, 430-438, 1998 | 51 | 1998 |
Attribute-based prevention of phishing attacks M Atighetchi, P Pal 2009 Eighth IEEE International Symposium on Network Computing and …, 2009 | 44 | 2009 |
Emerging patterns in adaptive, distributed real-time, embedded middleware JP Loyall, P Rubel, M Atighetchi, R Schantz, J Zinky 9th Conference on Pattern Language of Programs, 2002 | 40 | 2002 |
Building auto-adaptive distributed applications: The quo-apod experience M Atighetchi, PP Pal, CC Jones, P Rubel, RE Schantz, JP Loyall, JA Zinky 23rd International Conference on Distributed Computing Systems Workshops …, 2003 | 39 | 2003 |
Learning quantitative knowledge for multiagent coordination D Jensen, M Atighetchi, R Vincent, V Lesser AAAI/IAAI, 24-31, 1999 | 35 | 1999 |
An architecture for adaptive intrusion‐tolerant applications P Pal, P Rubel, M Atighetchi, F Webber, WH Sanders, M Seri, ... Software: Practice and Experience 36 (11‐12), 1331-1354, 2006 | 31 | 2006 |
Providing intrusion tolerance with itua M Cukier, T Courtney, J Lyons, HV Ramasamy, WH Sanders, M Seri, ... Supplement of the 2002 International Conference on Dependable Systems and …, 2002 | 29 | 2002 |
Multi-dimensional heuristic search as part of an integrated decision engine for evolving defenses B Benyo, M Atighetchi, F Yaman, MM Carvalho, TC Eskridge US Patent 10,862,918, 2020 | 27 | 2020 |
Providing intrusion tolerance with ITUA T Courtney, J Lyons, HGV Ramasamy, WH Sanders, M Seri, M Atighetchi, ... Supplemental Volume Int. Conf. on Dependable Systems & Networks (DSN-2002 …, 2002 | 25 | 2002 |
Using machine learning for behavior-based access control: Scalable anomaly detection on tcp connections and http requests A Adler, MJ Mayhew, J Cleveland, M Atighetchi, R Greenstadt MILCOM 2013-2013 IEEE Military Communications Conference, 1880-1887, 2013 | 24 | 2013 |