Mark Bilinski

Orcid: 0000-0003-3635-2027

According to our database1, Mark Bilinski authored at least 15 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
HoneyGAN Pots: A Deep Learning Approach for Generating Honeypots.
CoRR, 2024

Using Natural Language Processing Tools to Infer Adversary Techniques and Tactics Under the Mitre ATT&CK Framework.
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024

2023
Proceedings of the 2nd International Workshop on Adaptive Cyber Defense.
CoRR, 2023

Emotional State Classification and Related Behaviors Among Cyber Attackers.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

The Credential is Not Enough: Deception with Honeypots and Fake Credentials.
Proceedings of the Decision and Game Theory for Security: 14th International Conference, 2023

2022
Casino Rationale: Countering Attacker Deception in Zero-Sum Stackelberg Security Games of Bounded Rationality.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022

3D Text Recognition and Localization From Point Clouds via 2D Projection and Virtual Camera.
Proceedings of the IEEE 9th International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications, 2022

2021
No Time to Lie: Bounds on the Learning Rate of a Defender for Inferring Attacker Target Preferences.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

2020
Lie Another Day: Demonstrating Bias in a Multi-round Cyber Deception Game of Questionable Veracity.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

2019
You only Lie Twice: A Multi-round Cyber Deception Game of Questionable Veracity.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

2018
Optimal Placement of Honeypots for Network Defense.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

2017
Set reconciliation with an inaccurate oracle.
Proceedings of the 2017 International Conference on Computing, 2017

2012
Bandwidth of trees of diameter at most 4.
Discret. Math., 2012

2011
Circumference of 3-connected claw-free graphs and large Eulerian subgraphs of 3-edge-connected graphs.
J. Comb. Theory B, 2011

2007
On the reconstruction of planar graphs.
J. Comb. Theory B, 2007


  Loading...