Artificial Intelligence for Cyber Security
Papers from the 2016 AAAI Workshop
David R. Martinez, William W. Streilein, Kevin M. Carter, Arunesh Sinha, Cochairs
AAAI Technical Report WS-16-03
This technical report was published as part of The Workshops of the Thirtieth AAAI Conference on Artificial Intelligence: Technical Reports WS-16-01 – WS-16-15 by The AAAI Press, Palo Alto, California
Contents
Discovering Human and Machine Readable Descriptions of Malware Families
Blake Anderson, David McGrew, Subharthi Paul
Active Perception for Cyber Intrusion Detection and Defense
J. Benton, Robert P. Goldman, Mark Burstein, Joseph Mueller, Paul Robertson, Dan Cerys, Andreas Hoffman, Rusty Bobrow
Bandits for Cybersecurity: Adaptive Intrusion Detection Using Honeypots
Marcus Paul Gutierrez, Christopher Kiekintveld
Validating an Agent-Based Model of Human Password Behavior
Bruno Korbar, Jim Blythe, Ross Koppel, Vijay Kothari, Sean W. Smith
Inter-Temporal Incentives in Security Information Sharing Agreements
Parinaz Naghizadeh, Mingyan Liu
Toward Argumentation-Based Cyber Attribution
Eric Nunes, Paulo Shakarian, Gerardo Simari
Bayesian Networks with Prior Knowledge for Malware Phylogenetics
Diane Oyen, Blake Anderson, Christine Anderson-Cook
Socio-Cultural Modeling for Cyber Threat Actors
Paulo Shakarian, Jana Shakarian
UCO: A Unified Cybersecurity Ontology
Zareen Syed, Ankur Padia, Tim Finin, Lisa Mathews, Anupam Joshi
AAAI Digital Library
AAAI relies on your generous support through membership and donations. If you find these resources useful, we would be grateful for your support.