Stop the war!
Остановите войну!
for scientists:
default search action
George Cybenko
George V. Cybenko
Person information
- affiliation: Dartmouth College, Hanover, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c40]Paul Lintilhac, Joshua Ackerman, George Cybenko:
Research Report: Testing and Evaluating Artificial Intelligence Applications. SP (Workshops) 2024: 231-238 - [i7]George Cybenko, Joshua Ackerman, Paul Lintilhac:
TEL'M: Test and Evaluation of Language Models. CoRR abs/2404.10200 (2024) - 2023
- [c39]Joshua Ackerman, George Cybenko:
Large Language Models for Fuzzing Parsers (Registered Report). FUZZING 2023: 31-38 - [c38]Roger A. Hallman, John M. San Miguel, Arron Lu, Alejandro Monje, Mohammad R. Alam, George Cybenko:
Generative Deep Learning for Solutions to Data Deconflation Problems in Information and Operational Technology Networks. IoTBDS 2023: 231-235 - 2021
- [c37]Roger A. Hallman, George Cybenko:
The Data Deconflation Problem: Moving from Classical to Emerging Solutions. IoTBDS 2021: 375-380 - [c36]Joshua Ackerman, George Cybenko:
Formal Languages, Deep Learning, Topology and AlgebraicWord Problems. SP (Workshops) 2021: 134-141 - 2020
- [j53]Mark Chilenski, George Cybenko, Isaac Dekine, Piyush Kumar, Gil Raz:
Observability Properties of Colored Graphs. IEEE Trans. Netw. Sci. Eng. 7(3): 1687-1696 (2020) - [j52]Mark Chilenski, George Cybenko, Isaac Dekine, Piyush Kumar, Gil Raz:
Analytic Properties of Trackable Weak Models. IEEE Trans. Netw. Sci. Eng. 7(4): 2866-2875 (2020) - [e4]Sushil Jajodia, George Cybenko, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael P. Wellman:
Adaptive Autonomous Secure Cyber Systems. Springer 2020, ISBN 978-3-030-33431-4 [contents] - [i6]Mark Chilenski, George Cybenko, Isaac Dekine, Piyush Kumar, Gil Raz:
Analytic Properties of Trackable Weak Models. CoRR abs/2001.07608 (2020) - [i5]Joshua Ackerman, George Cybenko:
A Survey of Neural Networks and Formal Languages. CoRR abs/2006.01338 (2020)
2010 – 2019
- 2019
- [j51]George Cybenko, Steve Huntsman:
Analytics for directed contact networks. Appl. Netw. Sci. 4(1): 106:1-106:21 (2019) - [c35]George Cybenko:
Graph Models in Tracking Behaviors for Cyber-Security. GraMSec@CSF 2019: 3-6 - [p8]George Cybenko, Michael P. Wellman, Peng Liu, Minghui Zhu:
Overview of Control and Game Theory in Adaptive Cyber Defenses. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 1-11 - [p7]Massimiliano Albanese, Warren Connell, Sridhar Venkatesan, George Cybenko:
Moving Target Defense Quantification. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 94-111 - [p6]Massimiliano Albanese, Sushil Jajodia, Sridhar Venkatesan, George Cybenko, Thanh Hong Nguyen:
Adaptive Cyber Defenses for Botnet Detection and Mitigation. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 156-205 - [p5]Benjamin W. Priest, George Cybenko, Satinder Singh, Massimiliano Albanese, Peng Liu:
Online and Scalable Adaptive Cyber Defense. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 232-261 - [e3]George Cybenko, David J. Pym, Barbara Fila:
5th International Workshop on Graphical Models for Security, held in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC 2018, Oxford, UK, July 8, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11086, Springer 2019, ISBN 978-3-030-15464-6 [contents] - [e2]Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael P. Wellman:
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security. Lecture Notes in Computer Science 11830, Springer 2019, ISBN 978-3-030-30718-9 [contents] - 2018
- [j50]Anne K. Cybenko, George Cybenko:
AI and Fake News. IEEE Intell. Syst. 33(5): 1-5 (2018) - [j49]Katheryn A. Farris, Ankit Shah, George Cybenko, Rajesh Ganesan, Sushil Jajodia:
VULCON: A System for Vulnerability Prioritization, Mitigation, and Management. ACM Trans. Priv. Secur. 21(4): 16:1-16:28 (2018) - [c34]George Cybenko, Gabriel Fortunato Stocco:
Asymptotic Behavior of Attack Graph Games. From Database to Cyber Security 2018: 104-112 - [i4]Mark Chilenski, George Cybenko, Isaac Dekine, Piyush Kumar, Gil Raz:
Control Flow Graph Modifications for Improved RF-Based Processor Tracking Performance. CoRR abs/1809.07223 (2018) - [i3]Mark Chilenski, George Cybenko, Isaac Dekine, Piyush Kumar, Gil Raz:
Observability Properties of Colored Graphs. CoRR abs/1811.04803 (2018) - 2017
- [c33]George Cybenko:
Parallel Computing for Machine Learning in Social Network Analysis. IPDPS Workshops 2017: 1464-1471 - 2016
- [c32]Sridhar Venkatesan, Massimiliano Albanese, George Cybenko, Sushil Jajodia:
A Moving Target Defense Approach to Disrupting Stealthy Botnets. MTD@CCS 2016: 37-46 - [c31]George Cybenko:
ParSocial 2016 Keynote. IPDPS Workshops 2016: 1795 - [p4]George Cybenko, Gabriel Stocco, Patrick Sweeney:
Quantifying Covertness in Deceptive Cyber Operations. Cyber Deception 2016: 53-69 - 2015
- [c30]George Cybenko, Dijiang Huang:
MTD 2015: Second ACM Workshop on Moving Target Defense. CCS 2015: 1709-1710 - [c29]George Cybenko:
Deep Learning of Behaviors for Security. IWSPA@CODASPY 2015: 1 - [c28]Wenyaw Chan, George Cybenko, Murat Kantarcioglu, Ernst L. Leiss, Thamar Solorio, Bhavani Thuraisingham, Rakesh M. Verma:
Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students. IWSPA@CODASPY 2015: 55-57 - [p3]Patrick Sweeney, George Cybenko:
Identifying and Exploiting the Cyber High Ground for Botnets. Cyber Warfare 2015: 37-56 - [e1]George Cybenko, Dijiang Huang:
Proceedings of the Second ACM Workshop on Moving Target Defense, MTD 2015, Denver, Colorado, USA, October 12, 2015. ACM 2015, ISBN 978-1-4503-3823-3 [contents] - 2014
- [j48]George Cybenko, Kathy Clark-Fisher:
IEEE Security & Privacy: The Early Years. IEEE Secur. Priv. 12(3): 18-19 (2014) - [j47]George Cybenko, Eunice E. Santos:
Inaugural Issue Editorial. IEEE Trans. Comput. Soc. Syst. 1(1): 1-2 (2014) - [c27]George Cybenko, Jeff Hughes:
No free lunch in cyber security. MTD@CCS 2014: 1-12 - [c26]George Cybenko, Sushil Jajodia, Michael P. Wellman, Peng Liu:
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation. ICISS 2014: 1-8 - 2013
- [j46]Valentino Crespi, George Cybenko, Annarita Giani:
Engineering Statistical Behaviors for Attacking and Defending Covert Channels. IEEE J. Sel. Top. Signal Process. 7(1): 124-136 (2013) - [p2]Daniel Bilar, George Cybenko, John P. Murphy:
Adversarial Dynamics: The Conficker Case Study. Moving Target Defense 2013: 41-71 - 2012
- [j45]George Cybenko, Carl E. Landwehr:
Security Analytics and Measurements. IEEE Secur. Priv. 10(3): 5-8 (2012) - [c25]Vincent H. Berk, George Cybenko, Ian D. Gregorio-De Souza, John P. Murphy:
Managing Malicious Insider Risk through BANDIT. HICSS 2012: 2422-2430 - 2011
- [j44]George Cybenko, Valentino Crespi:
Learning Hidden Markov Models Using Nonnegative Matrix Factorization. IEEE Trans. Inf. Theory 57(6): 3963-3970 (2011) - [c24]Gabriel Fortunato Stocco, George Cybenko:
Exploiting Adversary's Risk Profiles in Imperfect Information Security Games. GameSec 2011: 22-33 - [i2]Valentino Crespi, George Cybenko, Annarita Giani:
Attacking and Defending Covert Channels and Behavioral Models. CoRR abs/1104.5071 (2011) - 2010
- [c23]Alexy Khrabrov, George Cybenko:
Discovering Influence in Communication Networks Using Dynamic Graph Analysis. SocialCom/PASSAT 2010: 288-294
2000 – 2009
- 2009
- [c22]Dave Twardowski, Robert Savell, George Cybenko:
Process learning of network interactions in market microstructures. CIFEr 2009: 51-57 - [c21]Alexy Khrabrov, George Cybenko:
A Language of Life: Characterizing People Using Cell Phone Tracks. CSE (4) 2009: 495-501 - 2008
- [j43]Lawrence Carin, George Cybenko, Jeff Hughes:
Cybersecurity Strategies: The QuERIES Methodology. Computer 41(8): 20-26 (2008) - [j42]Valentino Crespi, George Cybenko, Guofei Jiang:
The theory of trackability with applications to sensor networks. ACM Trans. Sens. Networks 4(3): 16:1-16:42 (2008) - [i1]George Cybenko, Valentino Crespi:
Learning Hidden Markov Models using Non-Negative Matrix Factorization. CoRR abs/0809.4086 (2008) - 2007
- [j41]George Cybenko, Vincent H. Berk:
Process Query Systems. Computer 40(1): 62-70 (2007) - [j40]Jason I. Hong, Mahadev Satyanarayanan, George Cybenko:
Guest Editors' Introduction: Security & Privacy. IEEE Pervasive Comput. 6(4): 15-17 (2007) - 2006
- [j39]George Cybenko:
Why Johnny Can't Evaluate Security Risk. IEEE Secur. Priv. 4(1): 5 (2006) - [j38]George Cybenko:
Weak Links, Strong Ties. IEEE Secur. Priv. 4(6): 3 (2006) - [j37]Guofei Jiang, George Cybenko, James A. Hendler:
Semantic Interoperability and Information Fluidity. Int. J. Cooperative Inf. Syst. 15(1): 1-22 (2006) - [c20]George Cybenko, Vincent H. Berk, Ian D. Gregorio-De Souza, Chad Behre:
Practical Autonomic Computing. COMPSAC (1) 2006: 3-14 - 2005
- [j36]John Yen, Robert L. Popp, George Cybenko, Latanya Sweeney, Paul Rosenzweig:
Homeland Security. IEEE Intell. Syst. 20(5): 76-86 (2005) - [j35]George Cybenko:
The One-Eyed Man Is King. IEEE Secur. Priv. 3(4): 4-5 (2005) - [j34]Diego Hernando, Valentino Crespi, George Cybenko:
Efficient computation of the hidden Markov model entropy for a given observation sequence. IEEE Trans. Inf. Theory 51(7): 2681-2685 (2005) - [c19]Christopher Roblee, Vincent H. Berk, George Cybenko:
Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. ICAC 2005: 123-133 - [c18]Yong Sheng, George Cybenko:
Distance measures for nonparametric weak process models. SMC 2005: 722-727 - 2004
- [j33]Guofei Jiang, George Cybenko:
Functional Validation in Grid Computing. Auton. Agents Multi Agent Syst. 8(2): 119-130 (2004) - [j32]George Cybenko, Annarita Giani, Paul Thompson:
Cognitive Hacking. Adv. Comput. 60: 35-73 (2004) - [j31]George Cybenko:
From the Editors: Don't Bring a Knife to a Gunfight. IEEE Secur. Priv. 2(2): 5 (2004) - [j30]George Cybenko:
Security Alchemy. IEEE Secur. Priv. 2(6): 5 (2004) - [c17]Guofei Jiang, George Cybenko:
Temporal and spatial distributed event correlation for network security. ACC 2004: 996-1001 - [p1]Paul Thompson, George Cybenko, Annarita Giani:
Cognitive Hacking. Economics of Information Security 2004: 255-287 - 2003
- [j29]George Cybenko:
A Critical Need, An Ambitious Mission, A New Magazine. IEEE Secur. Priv. 1(1): 5-9 (2003) - [j28]George Cybenko:
From the Editor: Sapphire/Slammer Redux. IEEE Secur. Priv. 1(2): 6 (2003) - [j27]George Cybenko:
Boiling Frogs? IEEE Secur. Priv. 1(4): 5 (2003) - [j26]George Cybenko:
From the Editors: Privacy Is the Issue. IEEE Secur. Priv. 1(6): 5-7 (2003) - [c16]Javed A. Aslam, Zack J. Butler, Florin Constantin, Valentino Crespi, George Cybenko, Daniela Rus:
Tracking a moving object with a binary sensor network. SenSys 2003: 150-161 - [c15]Guofei Jiang, George Cybenko, James A. Hendler:
Semantic depth and markup complexity. SMC 2003: 2138-2143 - 2002
- [j25]George Cybenko, Annarita Giani, Paul Thompson:
Cognitive Hacking: A Battle for the Mind. Computer 35(8): 50-56 (2002) - [j24]George Cybenko:
Understanding Quantum Computing [Book Review]. Comput. Sci. Eng. 4(4): 92 (2002) - [j23]David Kotz, George Cybenko, Robert S. Gray, Guofei Jiang, Ronald A. Peterson, Martin O. Hofmann, Daria A. Chacón, Kenneth R. Whitebread, James A. Hendler:
Performance Analysis of Mobile Agents for Filtering Data Streams on Wireless Networks. Mob. Networks Appl. 7(2): 163-174 (2002) - [j22]Robert S. Gray, George Cybenko, David Kotz, Ronald A. Peterson, Daniela Rus:
D'Agents: Applications and performance of a mobile-agent system. Softw. Pract. Exp. 32(6): 543-573 (2002) - [j21]Santiago Aja-Fernández, Carlos Alberola-López, George Cybenko:
A fuzzy MHT algorithm applied to text-based information tracking. IEEE Trans. Fuzzy Syst. 10(3): 360-374 (2002) - [c14]Guofei Jiang, George Cybenko:
Query routing optimization in sensor communication networks. CDC 2002: 1999-2004 - 2001
- [j20]George Cybenko:
Reducing quantum computations to elementary unitary operations. Comput. Sci. Eng. 3(2): 27-32 (2001) - [j19]George Cybenko:
Machine learning [Book Review]. Comput. Sci. Eng. 3(3): 95-96 (2001) - [j18]Katsuhiro Moizumi, George Cybenko:
The Traveling Agent Problem. Math. Control. Signals Syst. 14(3): 213-232 (2001) - 2000
- [j17]Brian E. Brewington, George Cybenko:
How dynamic is the Web? Comput. Networks 33(1-6): 257-276 (2000) - [j16]Brian E. Brewington, George Cybenko:
Keeping Up with the Changing Web. Computer 33(5): 52-58 (2000) - [c13]David Kotz, Guofei Jiang, Robert S. Gray, George Cybenko, Ronald A. Peterson:
Performance analysis of mobile agents for filtering data streams on wireless networks. MSWiM 2000: 85-94
1990 – 1999
- 1999
- [j15]Carl J. Beckmann, George Cybenko:
Computation in Communication. Comput. Sci. Eng. 1(1): 22 (1999) - [j14]Carl J. Beckmann, Donald McManus, George Cybenko:
Horizons in scientific and distributed computing. Comput. Sci. Eng. 1(1): 23-30 (1999) - [j13]Carlos Alberola-López, George V. Cybenko:
Tracking with text-based messages. IEEE Intell. Syst. 14(4): 70-78 (1999) - 1998
- [j12]Wilmer Caripe, George Cybenko, Katsuhiro Moizumi, Robert Gray:
Network awareness and mobile agent systems. IEEE Commun. Mag. 36(7): 44-49 (1998) - [c12]Robert S. Gray, David Kotz, George Cybenko, Daniela Rus:
D'Agents: Security in a Multiple-Language, Mobile-Agent System. Mobile Agents and Security 1998: 154-187 - [c11]Kenneth N. Ross, Ronald D. Chaney, George V. Cybenko, Daniel J. Burroughs, Alan S. Willsky:
Mobile agents in adaptive hierarchical Bayesian networks for global awareness. SMC 1998: 2207-2212 - 1997
- [j11]David Kotz, Robert S. Gray, Saurab Nog, Daniela Rus, Sumit Chawla, George Cybenko:
AGENT TCL: Targeting the Needs of Mobile Computers. IEEE Internet Comput. 1(4): 58-67 (1997) - [c10]George Cybenko:
High Performance Wireless Computing. ISHPC 1997: 71 - 1996
- [j10]George Cybenko:
Large-Scope Computing: The Industrial Challenges. ACM Comput. Surv. 28(4es): 21 (1996) - 1993
- [j9]George Cybenko:
Computation & Cognition (C. William Gear). SIAM Rev. 35(1): 147-148 (1993) - [j8]Sirpa Saarinen, Randall Bramley, George Cybenko:
Ill-Conditioning in Neural Network Training Problems. SIAM J. Sci. Comput. 14(3): 693-714 (1993) - 1992
- [j7]George Cybenko:
Approximation by superpositions of a sigmoidal function. Math. Control. Signals Syst. 5(4): 455 (1992) - [j6]David W. Krumme, George Cybenko, K. N. Venkataraman:
Gossiping in Minimal Time. SIAM J. Comput. 21(1): 111-139 (1992) - 1991
- [j5]Michael W. Berry, George Cybenko, John L. Larson:
Scientific benchmark characterizations. Parallel Comput. 17(10-11): 1173-1194 (1991) - [c9]David K. Bradley, George Cybenko, John L. Larson, F. Ahmad, J. Golab, Mark Straka:
Supercomputer workload decomposition and analysis. ICS 1991: 458-467 - [c8]Allan Tuchman, George Cybenko, David Jablonowski, Brian Bliss, Sanjay Sharma:
Vista: A System for Remote Data Visualization. PP 1991: 575-580 - [c7]Allan Tuchman, David Jablonowski, George Cybenko:
Run-Time Visualization of Program Data. IEEE Visualization 1991: 255-261 - 1990
- [c6]George Cybenko:
Complexity Theory of Neural Networks and Classification Problems. EURASIP Workshop 1990: 26-44 - [c5]George Cybenko, Lyle D. Kipp, Lynn Pointer, David J. Kuck:
Supercomputer performance evaluation and the Perfect Benchmarks. ICS 1990: 254-266
1980 – 1989
- 1989
- [j4]George Cybenko:
Dynamic Load Balancing for Distributed Memory Multiprocessors. J. Parallel Distributed Comput. 7(2): 279-301 (1989) - [j3]George Cybenko:
Approximation by superpositions of a sigmoidal function. Math. Control. Signals Syst. 2(4): 303-314 (1989) - 1988
- [j2]George Cybenko, T. G. Allen, J. E. Polito:
Practical parallel Union-Find algorithms for transitive closure and clustering. Int. J. Parallel Program. 17(5): 403-423 (1988) - 1987
- [j1]George Cybenko, David W. Krumme, K. N. Venkataraman:
Fixed Hypercube Embedding. Inf. Process. Lett. 25(1): 35-39 (1987) - [c4]David W. Krumme, George Cybenko, Alva L. Couch:
Instrumentation for distributed computing systems. FJCC 1987: 344 - [c3]George Cybenko, Tom Allen:
Recursive Binary Partitions-Abstract. PP 1987: 212 - 1986
- [c2]George Cybenko, David W. Krumme, K. N. Venkataraman:
Simultaneous Broadcasting in Multiprocessor Networks. ICPP 1986: 555-558
1970 – 1979
- 1979
- [c1]George Cybenko:
Round-off error propagation in Durbin's, Levinson's, and Trench's algorithms. ICASSP 1979: 498-501