default search action
Nandi Leslie
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j4]Sumukha Udupa, Abhishek Ninad Kulkarni, Shuo Han, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu:
Synthesizing Attack-Aware Control and Active Sensing Strategies Under Reactive Sensor Attacks. IEEE Control. Syst. Lett. 7: 265-270 (2023) - [c21]Haoxiang Ma, Shuo Han, Nandi Leslie, Charles A. Kamhoua, Jie Fu:
Optimal Decoy Resource Allocation for Proactive Defense in Probabilistic Attack Graphs. AAMAS 2023: 2616-2618 - [i11]Haoxiang Ma, Shuo Han, Nandi Leslie, Charles A. Kamhoua, Jie Fu:
Optimal Decoy Resource Allocation for Proactive Defense in Probabilistic Attack Graphs. CoRR abs/2301.01336 (2023) - 2022
- [j3]Soo-Yeon Ji, Bong-Keun Jeong, Charles A. Kamhoua, Nandi Leslie, Dong Hyun Jeong:
Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables. J. Netw. Comput. Appl. 203: 103392 (2022) - [j2]Ahmed H. Anwar, Charles A. Kamhoua, Nandi O. Leslie, Christopher Kiekintveld:
Honeypot Allocation for Cyber Deception Under Uncertainty. IEEE Trans. Netw. Serv. Manag. 19(3): 3438-3452 (2022) - [i10]Sumukha Udupa, Abhishek Ninad Kulkarni, Shuo Han, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu:
Synthesizing Attack-Aware Control and Active Sensing Strategies under Reactive Sensor Attacks. CoRR abs/2204.01584 (2022) - 2021
- [j1]Abhishek Ninad Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu:
Deceptive Labeling: Hypergames on Graphs for Stealthy Deception. IEEE Control. Syst. Lett. 5(3): 977-982 (2021) - [c20]Abhishek Ninad Kulkarni, Shuo Han, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu:
Qualitative Planning in Imperfect Information Games with Active Sensing and Reactive Sensor Attacks: Cost of Unawareness. CDC 2021: 586-592 - [c19]Nandi Leslie:
An Unsupervised Learning Approach for In-Vehicle Network Intrusion Detection. CISS 2021: 1-4 - [c18]Todd Huster, Jeremy E. J. Cohen, Zinan Lin, Kevin Chan, Charles A. Kamhoua, Nandi O. Leslie, Cho-Yu Jason Chiang, Vyas Sekar:
Pareto GAN: Extending the Representational Power of GANs to Heavy-Tailed Distributions. ICML 2021: 4523-4532 - [c17]Ahmed H. Anwar, Nandi O. Leslie, Charles A. Kamhoua:
Honeypot Allocation for Cyber Deception in Internet of Battlefield Things Systems. MILCOM 2021: 1005-1010 - [i9]Todd Huster, Jeremy E. J. Cohen, Zinan Lin, Kevin Chan, Charles A. Kamhoua, Nandi Leslie, Cho-Yu Jason Chiang, Vyas Sekar:
Pareto GAN: Extending the Representational Power of GANs to Heavy-Tailed Distributions. CoRR abs/2101.09113 (2021) - [i8]Abhishek Ninad Kulkarni, Shuo Han, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu:
Qualitative Planning in Imperfect Information Games with Active Sensing and Reactive Sensor Attacks: Cost of Unawareness. CoRR abs/2104.00176 (2021) - 2020
- [c16]Luan Huy Pham, Massimiliano Albanese, Ritu Chadha, Cho-Yu Jason Chiang, Sridhar Venkatesan, Charles A. Kamhoua, Nandi Leslie:
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses. CNS 2020: 1-9 - [c15]Zheyuan Ryan Shi, Ariel D. Procaccia, Kevin S. Chan, Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie, Charles A. Kamhoua, Fei Fang:
Learning and Planning in the Feature Deception Problem. GameSec 2020: 23-44 - [c14]Stephanie Milani, Weiran Shen, Kevin S. Chan, Sridhar Venkatesan, Nandi O. Leslie, Charles A. Kamhoua, Fei Fang:
Harnessing the Power of Deception in Attack Graph-Based Security Games. GameSec 2020: 147-167 - [c13]Abhishek Ninad Kulkarni, Jie Fu, Huan Luo, Charles A. Kamhoua, Nandi O. Leslie:
Decoy Allocation Games on Graphs with Temporal Logic Objectives. GameSec 2020: 168-187 - [c12]Ahmed H. Anwar, Nandi O. Leslie, Charles A. Kamhoua, Christopher Kiekintveld:
A Game Theoretic Framework for Software Diversity for Network Security. GameSec 2020: 297-311 - [c11]Aliou Badra Sarr, Ahmed H. Anwar, Charles A. Kamhoua, Nandi Leslie, Jaime C. Acosta:
Software Diversity for Cyber Deception. GLOBECOM 2020: 1-6 - [c10]Ahmed H. Anwar, Charles A. Kamhoua, Nandi Leslie:
Honeypot Allocation over Attack Graphs in Cyber Deception Games. ICNC 2020: 502-506 - [c9]Satyaki Nan, Swastik Brahma, Charles A. Kamhoua, Nandi O. Leslie:
Mitigation of Jamming Attacks via Deception. PIMRC 2020: 1-6 - [c8]Jaime C. Acosta, Anjon Basak, Christopher Kiekintveld, Nandi Leslie, Charles A. Kamhoua:
Cybersecurity Deception Experimentation System. SecDev 2020: 34-40 - [c7]Soo-Yeon Ji, Bong-Keun Jeong, Charles A. Kamhoua, Nandi Leslie, Dong Hyun Jeong:
Estimating Attack Risk of Network Activities in Temporal Domain: A Wavelet Transform Approach. UEMCON 2020: 826-832 - [c6]Dule Shu, Nandi O. Leslie, Charles A. Kamhoua, Conrad S. Tucker:
Generative adversarial attacks against intrusion detection systems using active learning. WiseML@WiSec 2020: 1-6 - [i7]Jie Fu, Abhishek Ninad Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua:
Secure-by-synthesis network with active deception and temporal logic specifications. CoRR abs/2002.07025 (2020) - [i6]Abhishek Ninad Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu:
Deceptive Labeling: Hypergames on Graphs for Stealthy Deception. CoRR abs/2004.05213 (2020) - [i5]Abhishek Ninad Kulkarni, Jie Fu, Huan Luo, Charles A. Kamhoua, Nandi O. Leslie:
Decoy Allocation Games on Graphs with Temporal Logic Objectives. CoRR abs/2010.01208 (2020)
2010 – 2019
- 2019
- [c5]Satyaki Nan, Swastik Brahma, Charles A. Kamhoua, Nandi O. Leslie:
Behavioral Cyber Deception: A Game and Prospect Theoretic Approach. GLOBECOM 2019: 1-6 - [c4]Ioannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Michael Emmi, Jemin George, Nandi Leslie, James Michaelis:
Application of Trust Assessment Techniques to IoBT Systems. MILCOM 2019: 833-840 - [c3]Ahmed H. Anwar, Charles A. Kamhoua, Nandi Leslie:
A game-theoretic framework for dynamic cyber deception in internet of battlefield things. MobiQuitous 2019: 522-526 - [c2]Soo-Yeon Ji, Charles A. Kamhoua, Nandi Leslie, Dong Hyun Jeong:
An Effective Approach to Classify Abnormal Network Traffic Activities using Wavelet Transform. UEMCON 2019: 666-672 - [c1]Jeman Park, Aziz Mohaisen, Charles A. Kamhoua, Michael J. Weisman, Nandi O. Leslie, Laurent Njilla:
Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments. WISA 2019: 299-312 - [i4]Nandi O. Leslie, Richard E. Harang, Lawrence P. Knachel, Alexander Kott:
Statistical Models for the Number of Successful Cyber Intrusions. CoRR abs/1901.04531 (2019) - [i3]Zheyuan Ryan Shi, Ariel D. Procaccia, Kevin S. Chan, Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie, Charles A. Kamhoua, Fei Fang:
Learning and Planning in Feature Deception Games. CoRR abs/1905.04833 (2019) - 2018
- [i2]Alexander Kott, Ryan Thomas, Martin Drasar, Markus Kont, Alexander Poylisher, Benjamin A. Blakely, Paul Théron, Nathaniel Evans, Nandi Leslie, Rajdeep Singh, Maria Rigaki, Shanchieh Jay Yang, Benoît Leblanc, Paul Losiewicz, Sylvain Hourlier, Misty K. Blowers, Hugh Harney, Gregory Wehner, Alessandro Guarino, Jana Komárková, James Rowell:
Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG. CoRR abs/1804.07646 (2018) - [i1]Alexander Kott, Benjamin A. Blakely, Diane Henshel, Gregory Wehner, James Rowell, Nathaniel Evans, Luis Muñoz-González, Nandi Leslie, Donald W. French, Donald Woodard, Kerry Krutilla, Amanda Joyce, Igor Linkov, Carmen Mas Machuca, Janos Sztipanovits, Hugh Harney, Dennis Kergl, Perri Nejib, Edward Yakabovicz, Steven Noel, Tim Dudman, Pierre Trepagnier, Sowdagar Badesha, Alfred Møller:
Approaches to Enhancing Cyber Resilience: Report of the North Atlantic Treaty Organization (NATO) Workshop IST-153. CoRR abs/1804.07651 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 23:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint