![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "Amanda Thart"
@inproceedings{DBLP:conf/aaai/RobertsonPSTS16, author = {John Robertson and Vivin Paliath and Jana Shakarian and Amanda Thart and Paulo Shakarian}, editor = {Dale Schuurmans and Michael P. Wellman}, title = {Data Driven Game Theoretic Cyber Threat Mitigation}, booktitle = {Proceedings of the Thirtieth {AAAI} Conference on Artificial Intelligence, February 12-17, 2016, Phoenix, Arizona, {USA}}, pages = {4041--4046}, publisher = {{AAAI} Press}, year = {2016}, url = {https://doi.org/10.1609/aaai.v30i2.19082}, doi = {10.1609/AAAI.V30I2.19082}, timestamp = {Mon, 04 Sep 2023 15:08:28 +0200}, biburl = {https://dblp.org/rec/conf/aaai/RobertsonPSTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/NunesDGMMPRSTS16, author = {Eric Nunes and Ahmad Diab and Andrew T. Gunn and Ericsson Marin and Vineet Mishra and Vivin Paliath and John Robertson and Jana Shakarian and Amanda Thart and Paulo Shakarian}, title = {Darknet and deepnet mining for proactive cybersecurity threat intelligence}, booktitle = {{IEEE} Conference on Intelligence and Security Informatics, {ISI} 2016, Tucson, AZ, USA, September 28-30, 2016}, pages = {7--12}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISI.2016.7745435}, doi = {10.1109/ISI.2016.7745435}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isi/NunesDGMMPRSTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NunesDGMMPRSTS16, author = {Eric Nunes and Ahmad Diab and Andrew Gunn and Ericsson Marin and Vineet Mishra and Vivin Paliath and John Robertson and Jana Shakarian and Amanda Thart and Paulo Shakarian}, title = {Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence}, journal = {CoRR}, volume = {abs/1607.08583}, year = {2016}, url = {http://arxiv.org/abs/1607.08583}, eprinttype = {arXiv}, eprint = {1607.08583}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NunesDGMMPRSTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/StantonTJVCS15, author = {Andrew Stanton and Amanda Thart and Ashish Jain and Priyank Vyas and Arpan Chatterjee and Paulo Shakarian}, editor = {Longbing Cao and Chengqi Zhang and Thorsten Joachims and Geoffrey I. Webb and Dragos D. Margineantu and Graham Williams}, title = {Mining for Causal Relationships: {A} Data-Driven Study of the Islamic State}, booktitle = {Proceedings of the 21th {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, Sydney, NSW, Australia, August 10-13, 2015}, pages = {2137--2146}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2783258.2788591}, doi = {10.1145/2783258.2788591}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/StantonTJVCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/StantonTJVCS15, author = {Andrew Stanton and Amanda Thart and Ashish Jain and Priyank Vyas and Arpan Chatterjee and Paulo Shakarian}, title = {Mining for Causal Relationships: {A} Data-Driven Study of the Islamic State}, journal = {CoRR}, volume = {abs/1508.01192}, year = {2015}, url = {http://arxiv.org/abs/1508.01192}, eprinttype = {arXiv}, eprint = {1508.01192}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/StantonTJVCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.