Kim Hammar

Orcid: 0000-0003-1773-8354

According to our database1, Kim Hammar authored at least 23 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Learning Near-Optimal Intrusion Responses Against Dynamic Attackers.
IEEE Trans. Netw. Serv. Manag., February, 2024

Optimal Security Response to Network Intrusions in IT Systems.
PhD thesis, 2024

Optimal Defender Strategies for CAGE-2 using Causal Modeling and Tree Search.
CoRR, 2024

Conjectural Online Learning with First-order Beliefs in Asymmetric Information Stochastic Games.
CoRR, 2024

Automated Security Response through Online Learning with Adaptive Conjectures.
CoRR, 2024

Online Policy Adaptation for Networked Systems using Rollout.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

Intrusion Tolerance as a Two-Level Game.
Proceedings of the Decision and Game Theory for Security - 15th International Conference, 2024

Intrusion Tolerance for Networked Systems through Two-Level Feedback Control.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

2023
Scalable Learning of Intrusion Responses through Recursive Decomposition.
CoRR, 2023

Optimal Observation-Intervention Trade-Off in Optimisation Problems with Causal Structure.
CoRR, 2023

Demonstrating a System for Dynamically Meeting Management Objectives on a Service Mesh.
Proceedings of the NOMS 2023, 2023

Digital Twins for Security Automation.
Proceedings of the NOMS 2023, 2023

Scalable Learning of Intrusion Response Through Recursive Decomposition.
Proceedings of the Decision and Game Theory for Security: 14th International Conference, 2023

2022
Intrusion Prevention Through Optimal Stopping.
IEEE Trans. Netw. Serv. Manag., 2022

Learning Security Strategies through Game Play and Optimal Stopping.
CoRR, 2022

A System for Interactive Examination of Learned Security Policies.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

An Online Framework for Adapting Security Policies in Dynamic IT Environments.
Proceedings of the 18th International Conference on Network and Service Management, 2022

2021
Learning Intrusion Prevention Policies through Optimal Stopping.
Proceedings of the 17th International Conference on Network and Service Management, 2021

2020
Deep text classification of Instagram data using word embeddings and weak supervision.
Web Intell., 2020

Finding Effective Security Strategies through Reinforcement Learning and Self-Play.
Proceedings of the 16th International Conference on Network and Service Management, 2020

2019
TALS: A Framework for Text Analysis, Fine-Grained Annotation, Localisation and Semantic Segmentation.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Deep Text Mining of Instagram Data without Strong Supervision.
Proceedings of the 2018 IEEE/WIC/ACM International Conference on Web Intelligence, 2018

Dynamic CNN Models for Fashion Recommendation in Instagram.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018


  Loading...