Nicole Nichols

Affiliations:
  • Palo Alto Networks, USA


According to our database1, Nicole Nichols authored at least 11 papers between 2016 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Beyond CAGE: Investigating Generalization of Learned Autonomous Network Defense Policies.
CoRR, 2022

Bridging Automated to Autonomous Cyber Defense: Foundational Analysis of Tabular Q-Learning.
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022

2020
Machine Learning Algorithms for Active Monitoring of High Performance Computing as a Service (HPCaaS) Cloud Environments.
CoRR, 2020

Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

2018
Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection.
CoRR, 2018

Projecting Trouble: Light based Adversarial Attacks on Deep Learning Classifiers.
Proceedings of the AAAI Symposium on Adversary-Aware Learning Techniques and Trends in Cybersecurity (ALEC 2018) co-located with the Association for the Advancement of Artificial Intelligence 2018 Fall Symposium Series (AAAI-FSS 2018), 2018

Recurrent Neural Network Language Models for Open Vocabulary Event-Level Cyber Anomaly Detection.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Faster Fuzzing: Reinitialization with Deep Neural Models.
CoRR, 2017

Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

Predicting User Roles from Computer Logs Using Recurrent Neural Networks.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Identification of program signatures from cloud computing system telemetry data.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016


  Loading...