Experiment as a service
TW Edgar, TR Rice - 2017 IEEE International Symposium on …, 2017 - ieeexplore.ieee.org
The absence of scientific validation of results is one of the greatest obstacles in the field of
cyber security. The lack of reproducible experimental environments and results is a main …
cyber security. The lack of reproducible experimental environments and results is a main …
High fidelity adaptive cyber emulation
Having reviewed a wide array of tools to either implement user models or simulate network
traffic, we were unable to find a tool that generates network traffic while maintaining …
traffic, we were unable to find a tool that generates network traffic while maintaining …
Learning to efficiently pursue communication goals on the web with the GOSMR architecture
K Gold - Proceedings of the AAAI Conference on Artificial …, 2013 - ojs.aaai.org
We present GOSMR (" goal oriented scenario modeling robots"), a cognitive architecture
designed to show coordinated, goal-directed behavior over the Internet, focusing on the web …
designed to show coordinated, goal-directed behavior over the Internet, focusing on the web …
Network Analysis with Stochastic Grammars
AC Lin - 2015 - scholar.afit.edu
Digital forensics requires significant manual effort to identify items of evidentiary interest from
the ever-increasing volume of data in modern computing systems. One of the tasks digital …
the ever-increasing volume of data in modern computing systems. One of the tasks digital …