Alert-driven attack graph generation using s-pdfa A Nadeem, S Verwer, S Moskal, SJ Yang IEEE transactions on dependable and secure computing 19 (2), 731-746, 2021 | 60 | 2021 |
Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach S Moskal, SJ Yang, ME Kuhl The Journal of Defense Modeling and Simulation 15 (1), 13-29, 2018 | 49 | 2018 |
LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing S Moskal, S Laney, E Hemberg, UM O'Reilly arXiv preprint arXiv:2310.06936, 2023 | 30 | 2023 |
Context model fusion for multistage network attack simulation S Moskal, B Wheeler, D Kreider, ME Kuhl, SJ Yang 2014 IEEE Military Communications Conference, 158-163, 2014 | 27 | 2014 |
Session-level adversary intent-driven cyberattack simulator M Drašar, S Moskal, S Yang, P Zat'ko 2020 IEEE/ACM 24th International Symposium on Distributed Simulation and …, 2020 | 25 | 2020 |
Extracting and evaluating similar and unique cyber attack strategies from intrusion alerts S Moskal, SJ Yang, ME Kuhl 2018 IEEE international conference on intelligence and security informatics …, 2018 | 25 | 2018 |
Evolving code with a large language model E Hemberg, S Moskal, UM O’Reilly Genetic Programming and Evolvable Machines 25 (2), 21, 2024 | 20 | 2024 |
Sage: Intrusion alert-driven attack graph extractor A Nadeem, S Verwer, SJ Yang 2021 IEEE symposium on visualization for cyber security (VizSec), 36-41, 2021 | 20 | 2021 |
Cyberattack action-intent-framework for mapping intrusion observables S Moskal, SJ Yang arXiv preprint arXiv:2002.07838, 2020 | 15 | 2020 |
Enabling visual analytics via alert-driven attack graphs A Nadeem, S Verwer, S Moskal, SJ Yang Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021 | 14 | 2021 |
Framework to describe intentions of a cyber attack action S Moskal, SJ Yang arXiv preprint arXiv:2002.07838, 2020 | 11 | 2020 |
Simulating attack behaviors in enterprise networks S Moskal, D Kreider, L Hays, B Wheeler, SJ Yang, M Kuhl 2013 IEEE Conference on Communications and Network Security (CNS), 359-360, 2013 | 11 | 2013 |
Translating intrusion alerts to cyberattack stages using pseudo-active transfer learning (PATRL) S Moskal, SJ Yang 2021 IEEE conference on communications and network security (CNS), 110-118, 2021 | 10 | 2021 |
Who shall we follow in twitter for cyber vulnerability? B Cui, S Moskal, H Du, SJ Yang Social Computing, Behavioral-Cultural Modeling and Prediction: 6th …, 2013 | 10 | 2013 |
Assessing Large Language Model’s knowledge of threat behavior in MITRE ATT&CK E Garza, E Hemberg, S Moskal, UM O’Reilly KDD, 2023 | 8 | 2023 |
On the variety and veracity of cyber intrusion alerts synthesized by generative adversarial networks C Sweet, S Moskal, SJ Yang ACM Transactions on Management Information Systems (TMIS) 11 (4), 1-21, 2020 | 8 | 2020 |
Knowledge-based decision making for simulating cyber attack behaviors SF Moskal Rochester Institute of Technology, 2016 | 7 | 2016 |
Assessing the likelihood of cyber network infiltration using rare-event simulation AL Krall, ME Kuhl, SF Moskal, SJ Yang 2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-7, 2016 | 5 | 2016 |
Synthetic intrusion alert generation through generative adversarial networks C Sweet, S Moskal, SJ Yang MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM), 1-6, 2019 | 4 | 2019 |
CyberEvo: evolutionary search of knowledge-based behaviors in a cyber attack campaign S Moskal, E Hemberg, UM O'Reilly Proceedings of the Genetic and Evolutionary Computation Conference Companion …, 2022 | 3 | 2022 |