Christopher Kiekintveld
Orcid: 0000-0003-0615-9584Affiliations:
- University of Texas at El Paso, USA
According to our database1,
Christopher Kiekintveld
authored at least 124 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
An investigation into the performances of the Current state-of-the-art Naive Bayes, Non-Bayesian and Deep Learning Based Classifier for Phishing Detection: A Survey.
CoRR, 2024
Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework.
CoRR, 2024
An in-Depth Investigation Into the Performance of State-of-the-Art Zero-Shot, Single-Shot, and Few-Shot Learning Approaches on an Out-of-Distribution Zero-Day Malware Attack Detection.
Proceedings of the International Symposium on Networks, Computers and Communications, 2024
Towards an in-Depth Evaluation of the Performance, Suitability and Plausibility of Few-Shot Meta Transfer Learning on An Unknown Out-of-Distribution Cyber-attack Detection.
Proceedings of the International Symposium on Networks, Computers and Communications, 2024
An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey.
Proceedings of the IEEE International Conference on Electro Information Technology, 2024
2023
Artif. Intell., March, 2023
ACM Comput. Surv., 2023
Proceedings of the IEEE International Systems Conference, 2023
Optimizing Crop Recommendations for Sustainable Agriculture: Leveraging Bayesian Networks in a Smart Crop Recommendation System.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023
Enhancing IoT Device Security: Predicting and Analyzing Reconnaissance Attacks Using Flags and Time-Based Attributes.
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023
Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach.
Proceedings of the Decision and Game Theory for Security: 14th International Conference, 2023
Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection.
Proceedings of the IEEE International Conference on Artificial Intelligence, 2023
2022
IEEE Trans. Netw. Serv. Manag., 2022
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022
2021
Comput. Hum. Behav., 2021
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021
2020
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020
Proceedings of the Digital Forensics and Cyber Crime - 11th EAI International Conference, 2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
A Realistic Approach for Network Traffic Obfuscation Using Adversarial Machine Learning.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020
2019
Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games.
Comput. Secur., 2019
Comput. Secur., 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019
Proceedings of the 41th Annual Meeting of the Cognitive Science Society, 2019
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019
2018
Proceedings of the 2018 ACM Conference on Economics and Computation, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
Bidding in Periodic Double Auctions Using Heuristics and Dynamic Monte Carlo Tree Search.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
Integrated Learning and Feature Selection for Deep Neural Networks in Multispectral Images.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018
2017
Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017
Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017
2016
Proceedings of the Advances in Practical Applications of Scalable Multi-agent Systems. The PAAMS Collection, 2016
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016
Proceedings of the Autonomous Agents and Multiagent Systems - AAMAS 2016 Workshops, - Visionary Papers, 2016
Proceedings of the Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets, 2016
Optimizing Personalized Email Filtering Thresholds to Mitigate Sequential Spear Phishing Attacks.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
Preventing Illegal Logging: Simultaneous Optimization of Resource Teams and Tactics for Security.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
Proceedings of the Artificial Intelligence for Cyber Security, 2016
Using Correlated Strategies for Computing Stackelberg Equilibria in Extensive-Form Games.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
2015
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015
Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015
Combining Compact Representation and Incremental Generation in Large Games with Sequential Strategies.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
2014
An Exact Double-Oracle Algorithm for Zero-Sum Extensive-Form Games with Imperfect Information.
J. Artif. Intell. Res., 2014
Auton. Agents Multi Agent Syst., 2014
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014
2013
Improving resource allocation strategies against human adversaries in security games: An extended study.
Artif. Intell., 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013
Double-oracle algorithm for computing an exact nash equilibrium in zero-sum extensive-form games.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013
Initial Exploration of Machine Learning to Predict Customer Demand in an Energy Market Simulation.
Proceedings of the Trading Agent Design and Analysis, 2013
2012
TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems Using Game Theory.
AI Mag., 2012
Proceedings of the Twenty-Fourth Conference on Innovative Applications of Artificial Intelligence, 2012
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012
Iterative Algorithm for Solving Two-player Zero-sum Extensive-form Games with Imperfect Information.
Proceedings of the ECAI 2012, 2012
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012
Proceedings of the Game Theory for Security, 2012
Proceedings of the Game Theory for Security, 2012
Proceedings of the Game Theory for Security, 2012
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012
2011
SIGecom Exch., 2011
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness.
J. Artif. Intell. Res., 2011
Proceedings of the IJCAI 2011, 2011
Proceedings of the IJCAI 2011, 2011
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011
Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011
Proceedings of the Help Me Help You: Bridging the Gaps in Human-Agent Collaboration, 2011
Linear-Time Resource Allocation in Security Games with Identical Fully Protective Resources.
Proceedings of the Applied Adversarial Reasoning and Risk Modeling, 2011
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011
Towards the Integration of Multi-Attribute Optimization and Game Theory for Border Security Patrolling Strategies.
Proceedings of the Applied Adversarial Reasoning and Risk Modeling, 2011
2010
Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service.
Interfaces, 2010
A Framework for Evaluating Deployed Security Systems: Is There a Chink in your ARMOR?
Informatica (Slovenia), 2010
Editor's Introduction to the Special Issue on Quantitative Risk Analysis Techniques for Security Applications.
Informatica (Slovenia), 2010
Methods and Algorithms for Infinite Bayesian Stackelberg Security Games - (Extended Abstract).
Proceedings of the Decision and Game Theory for Security, 2010
Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010
Asynchronous algorithms for approximate distributed constraint optimization with quality bounds.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010
2009
Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009
2008
PhD thesis, 2008
Selecting strategies using empirical game models: an experimental analysis of meta-strategies.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008
2007
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007
Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, 2007
2006
Proceedings of the Proceedings 7th ACM Conference on Electronic Commerce (EC-2006), 2006
Proceedings of the Proceedings 7th ACM Conference on Electronic Commerce (EC-2006), 2006
Market Efficiency, Sales Competition, and the Bullwhip Effect in the TAC SCM Tournaments.
Proceedings of the Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets, 2006
2005
Proceedings of the Agent-Mediated Electronic Commerce. Designing Trading Agents and Mechanisms, 2005
2004
Proceedings of the Computers and Games, 4th International Conference, 2004
Proceedings of the Fourteenth International Conference on Automated Planning and Scheduling (ICAPS 2004), 2004