default search action
William W. Streilein
Person information
- affiliation: Massachusetts Institute of Technology
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [i5]John Emanuello, Kimberly Ferguson-Walter, Erik Hemberg, Una-May O'Reilly, Ahmad Ridley, Dennis Ross, Diane Staheli, William W. Streilein:
Proceedings - AI/ML for Cybersecurity: Challenges, Solutions, and Novel Ideas at SIAM Data Mining 2021. CoRR abs/2104.13254 (2021) - [i4]Gwendolyn Gettliffe, Adam Norige, Ted Londner, Jonathan Saunders, Dieter W. Schuldt, William W. Streilein:
Engineering and Implementation of SimAEN. CoRR abs/2111.12825 (2021) - 2020
- [i3]Dennis Ross, Arunesh Sinha, Diane Staheli, Bill Streilein:
Proceedings of the Artificial Intelligence for Cyber Security (AICS) Workshop 2020. CoRR abs/2002.08320 (2020)
2010 – 2019
- 2019
- [j6]Guy Barash, Mauricio Castillo-Effen, Niyati Chhaya, Peter Clark, Huáscar Espinoza, Eitan Farchi, Christopher W. Geib, Odd Erik Gundersen, Seán Ó hÉigeartaigh, José Hernández-Orallo, Chiori Hori, Xiaowei Huang, Kokil Jaidka, Pavan Kapanipathi, Sarah Keren, Seokhwan Kim, Marc Lanctot, Danny Lange, Julian J. McAuley, David R. Martinez, Marwan Mattar, Mausam, Martin Michalowski, Reuth Mirsky, Roozbeh Mottaghi, Joseph C. Osborn, Julien Pérolat, Martin Schmid, Arash Shaban-Nejad, Onn Shehory, Biplav Srivastava, William W. Streilein, Kartik Talamadupula, Julian Togelius, Koichiro Yoshino, Quanshi Zhang, Imed Zitouni:
Reports of the Workshops Held at the 2019 AAAI Conference on Artificial Intelligence. AI Mag. 40(3): 67-78 (2019) - 2018
- [j5]Bruno Bouchard, Kevin Bouchard, Noam Brown, Niyati Chhaya, Eitan Farchi, Sébastien Gaboury, Christopher W. Geib, Amelie Gyrard, Kokil Jaidka, Sarah Keren, Roni Khardon, Parisa Kordjamshidi, David R. Martinez, Nicholas Mattei, Martin Michalowski, Reuth Mirsky, Joseph C. Osborn, Cem Sahin, Onn Shehory, Arash Shaban-Nejad, Amit P. Sheth, Ilan Shimshoni, Howard E. Shrobe, Arunesh Sinha, Atanu R. Sinha, Biplav Srivastava, William W. Streilein, Georgios Theocharous, Kristen Brent Venable, Neal Wagner, Anna Zamansky:
Reports of the Workshops of the 32nd AAAI Conference on Artificial Intelligence. AI Mag. 39(4): 45-56 (2018) - [i2]William W. Streilein, Brad Dillman:
Proceedings of the Artificial Intelligence for Cyber Security (AICS) Workshop 2019. CoRR abs/1812.07469 (2018) - 2017
- [j4]Monica Anderson, Roman Barták, John S. Brownstein, David L. Buckeridge, Hoda Eldardiry, Christopher W. Geib, Maria L. Gini, Aaron Isaksen, Sarah Keren, Robert Laddaga, Viliam Lisý, Rodney Martin, David R. Martinez, Martin Michalowski, Loizos Michael, Reuth Mirsky, Thanh Hai Nguyen, Michael J. Paul, Enrico Pontelli, Scott Sanner, Arash Shaban-Nejad, Arunesh Sinha, Shirin Sohrabi, Kumar Sricharan, Biplav Srivastava, Mark Stefik, William W. Streilein, Nathan R. Sturtevant, Kartik Talamadupula, Michael Thielscher, Julian Togelius, Tran Cao Son, Long Tran-Thanh, Neal Wagner, Byron C. Wallace, Szymon Wilk, Jichen Zhu:
Reports of the Workshops of the Thirty-First AAAI Conference on Artificial Intelligence. AI Mag. 38(3): 72-82 (2017) - [c16]Richard P. Lippman, David J. Weller-Fahy, Alyssa C. Mensch, William M. Campbell, Joseph P. Campbell, William W. Streilein, Kevin M. Carter:
Toward Finding Malicious Cyber Discussions in Social Media. AAAI Workshops 2017 - [c15]Neal Wagner, Cem Safak Sahin, Jaime Peña, William W. Streilein:
A nature-inspired decision system for secure cyber network architecture. SSCI 2017: 1-8 - 2016
- [j3]Stefano V. Albrecht, Bruno Bouchard, John S. Brownstein, David L. Buckeridge, Cornelia Caragea, Kevin M. Carter, Adnan Darwiche, Blaz Fortuna, Yannick Francillette, Sébastien Gaboury, C. Lee Giles, Marko Grobelnik, Estevam R. Hruschka Jr., Jeffrey O. Kephart, Parisa Kordjamshidi, Viliam Lisý, Daniele Magazzeni, João Marques-Silva, Pierre Marquis, David R. Martinez, Marek P. Michalowski, Arash Shaban-Nejad, Zeinab Noorian, Enrico Pontelli, Alex Rogers, Stephanie Rosenthal, Dan Roth, Arunesh Sinha, William W. Streilein, Sylvie Thiébaux, Tran Cao Son, Byron C. Wallace, Toby Walsh, Michael Witbrock, Jie Zhang:
Reports of the 2016 AAAI Workshop Program. AI Mag. 37(3): 99-108 (2016) - [c14]Michael L. Winterrose, Kevin M. Carter, Neal Wagner, William W. Streilein:
Balancing Security and Performance for Agility in Dynamic Threat Environments. DSN 2016: 607-617 - [c13]Shannon C. Roberts, John T. Holodnak, Trang Nguyen, Sophia Yuditskaya, Maja Milosavljevic, William W. Streilein:
A Model-Based Approach to Predicting the Performance of Insider Threat Detection Systems. IEEE Symposium on Security and Privacy Workshops 2016: 314-323 - [c12]Neal Wagner, Cem Safak Sahin, Michael L. Winterrose, James Riordan, Jaime Peña, Diana Hanson, William W. Streilein:
Towards automated cyber decision support: A case study on network segmentation for security. SSCI 2016: 1-10 - [e1]David R. Martinez, William W. Streilein, Kevin M. Carter, Arunesh Sinha:
Artificial Intelligence for Cyber Security, Papers from the 2016 AAAI Workshop, Phoenix, Arizona, USA, February 12, 2016. AAAI Technical Report WS-16-03, AAAI Press 2016 [contents] - 2015
- [c11]David Bigelow, Thomas Hobson, Robert Rudd, William W. Streilein, Hamed Okhravi:
Timely Rerandomization for Mitigating Memory Disclosures. CCS 2015: 268-279 - [c10]Ben W. Priest, Era Vuksani, Neal Wagner, Brady Tello, Kevin M. Carter, William W. Streilein:
Agent-based simulation in support of moving target cyber defense technology development and evaluation. SpringSim (CNS) 2015: 16-23 - [c9]Neal Wagner, Richard Lippmann, Michael L. Winterrose, James Riordan, Tamara Yu, William W. Streilein:
Agent-based simulation for assessing network security risk due to unauthorized hardware. SpringSim (ADS) 2015: 18-26 - 2014
- [j2]Hamed Okhravi, Thomas Hobson, David Bigelow, William W. Streilein:
Finding Focus in the Blur of Moving-Target Techniques. IEEE Secur. Priv. 12(2): 16-26 (2014) - [j1]Kevin M. Carter, Nwokedi C. Idika, William W. Streilein:
Probabilistic Threat Propagation for Network Security. IEEE Trans. Inf. Forensics Secur. 9(9): 1394-1405 (2014) - [c8]Thomas Hobson, Hamed Okhravi, David Bigelow, Robert Rudd, William W. Streilein:
On the Challenges of Effective Movement. MTD@CCS 2014: 41-50 - [i1]Michael L. Winterrose, Kevin M. Carter, Neal Wagner, William W. Streilein:
Adaptive Attacker Strategy Development Against Moving Target Cyber Defenses. CoRR abs/1407.8540 (2014) - 2013
- [c7]Kevin Gold, Zachary J. Weber, Ben Priest, Josh Ziegler, Karen Sittig, William W. Streilein, Mark Mazumder:
Modeling how thinking about the past and future impacts network traffic with the gosmr architecture. AAMAS 2013: 127-134 - [c6]Kevin M. Carter, Nwokedi C. Idika, William W. Streilein:
Probabilistic threat propagation for malicious activity detection. ICASSP 2013: 2940-2944 - [c5]Richard Skowyra, Kelly Casteel, Hamed Okhravi, Nickolai Zeldovich, William W. Streilein:
Systematic Analysis of Defenses against Return-Oriented Programming. RAID 2013: 82-102 - 2012
- [c4]Kevin M. Carter, William W. Streilein:
Probabilistic reasoning for streaming anomaly detection. SSP 2012: 377-380 - 2011
- [c3]William W. Streilein, John Truelove, Chad R. Meiners, Gregory Eakman:
Cyber situational awareness through operational streaming analysis. MILCOM 2011: 1152-1157
1990 – 1999
- 1998
- [c2]Eric Granger, Stephen Grossberg, Mark A. Rubin, William W. Streilein:
Familiarity Discrimination of Radar Pulses. NIPS 1998: 875-881 - 1997
- [c1]Gail A. Carpenter, Mark A. Rubin, William W. Streilein:
ARTMAP-FD: familiarity discrimination applied to radar target recognition. ICNN 1997: 1459-1464
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint