Folgen
Christopher Neal
Christopher Neal
Bestätigte E-Mail-Adresse bei polymtl.ca
Titel
Zitiert von
Zitiert von
Jahr
A linked data platform for mining software repositories
I Keivanloo, C Forbes, A Hmood, M Erfani, C Neal, G Peristerakis, ...
2012 9th IEEE Working Conference on Mining Software Repositories (MSR), 32-35, 2012
682012
Reinforcement learning based penetration testing of a microgrid control algorithm
C Neal, H Dagdougui, A Lodi, JM Fernandez
2021 IEEE 11th Annual Computing and Communication Workshop and Conference …, 2021
152021
Evading deep reinforcement learning-based network intrusion detection with adversarial attacks
MA Merzouk, J Delas, C Neal, F Cuppens, N Boulahia-Cuppens, R Yaich
Proceedings of the 17th International Conference on Availability …, 2022
42022
Ontology-Based Anomaly Detection for Air Traffic Control Systems
C Neal, JY De Miceli, D Barrera, J Fernandez
arXiv preprint arXiv:2207.00637, 2022
32022
Real-Time Defensive Strategy Selection via Deep Reinforcement Learning
A Charpentier, C Neal, N Boulahia-Cuppens, F Cuppens, R Yaich
Proceedings of the 18th International Conference on Availability …, 2023
22023
Attacker attribution via characteristics inference using honeypot data
P Crochelet, C Neal, NB Cuppens, F Cuppens
International Conference on Network and System Security, 155-169, 2022
22022
Advancements in Hardening the Cybersecurity Posture of Nuclear Power Plant Defence-In-Depth Network Architecture
C Neal, D Trask, K Thiyagarajan, R Doucet, P Adamson, M Daley, ...
22020
Notes on generating satisfiable SAT instances using random subgraph isomorphism
C Anton, C Neal
Advances in Artificial Intelligence: 23rd Canadian Conference on Artificial …, 2010
22010
How to Better Fit Reinforcement Learning for Pentesting: A New Hierarchical Approach
MA Faillon, B Bout, J Francq, C Neal, N Boulahia-Cuppens, F Cuppens, ...
European Symposium on Research in Computer Security, 313-332, 2024
12024
Optimal Automated Generation of Playbooks
KA Saint-Hilaire, C Neal, F Cuppens, N Boulahia-Cuppens, M Hadji
Data and Applications Security and Privacy XXXVIII: 38th Annual IFIP WG 11.3 …, 2024
12024
From Traits to Threats: Learning Risk Indicators of Malicious Insider Using Psychometric Data
N Nanamou, C Neal, N Boulahia-Cuppens, F Cuppens, A Bkakria
International Conference on Information Systems Security, 180-200, 2025
2025
Attack-Defense Graph Generation: Instantiating Incident Response Actions on Attack Graphs
KA Saint-Hilaire, C Neal, F Cuppens, N Cuppens-Boulahia, F Bassi
IEEE International Conference on Trust, Security and Privacy in Computing …, 2024
2024
Adversarial robustness of deep reinforcement learning-based intrusion detection
MA Merzouk, C Neal, J Delas, R Yaich, N Boulahia-Cuppens, F Cuppens
International Journal of Information Security, 1-27, 2024
2024
Matching Knowledge Graphs for Cybersecurity Countermeasures Selection
KA Saint-Hilaire, C Neal, F Cuppens, N Cuppens-Boulahia, M Hadji
Science of Cyber Security-6th International Conference, SciSec 2023 …, 2024
2024
Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection
V Aurora, C Neal, A Proulx, N Boulahia Cuppens, F Cuppens
International Symposium on Foundations and Practice of Security, 53-68, 2023
2023
Automated Attacker Behaviour Classification Using Threat Intelligence Insights
P Crochelet, C Neal, N Boulahia Cuppens, F Cuppens, A Proulx
International Symposium on Foundations and Practice of Security, 285-301, 2023
2023
Intrusion Detection with Adversarial Attacks
MA Merzouk, J Delas, C Neal, F Cuppens, N Boulahia-Cuppens, R Yaich
2022
Methods for Assessing the Cybersecurity Posture of Critical Infrastructure Via Testbed-Based Experimentation
C Neal
Ecole Polytechnique, Montreal (Canada), 2021
2021
Analyzing the Resiliency of Microgrid Control Algorithms Against Malicious Input
C Neal, R Al Mallah, JM Fernandez, A Lodi
2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE …, 2020
2020
A Comparison of Biology-based Metaheuristics for Finding Piecewise Linear Approximations of Digitized Soundcurves.
C Neal, J Mohr
International Conference on Genetic and Evolutionary Methods (GEM), 118-122, 2009
2009
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20