default search action
George Cybenko
Person information
- affiliation: Dartmouth College, Hanover, USA
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c40]Paul Lintilhac, Joshua Ackerman, George Cybenko:
Research Report: Testing and Evaluating Artificial Intelligence Applications. SP (Workshops) 2024: 231-238 - [i7]George Cybenko, Joshua Ackerman, Paul Lintilhac:
TEL'M: Test and Evaluation of Language Models. CoRR abs/2404.10200 (2024) - 2023
- [c39]Joshua Ackerman, George Cybenko:
Large Language Models for Fuzzing Parsers (Registered Report). FUZZING 2023: 31-38 - [c38]Roger A. Hallman, John M. San Miguel, Arron Lu, Alejandro Monje, Mohammad R. Alam, George Cybenko:
Generative Deep Learning for Solutions to Data Deconflation Problems in Information and Operational Technology Networks. IoTBDS 2023: 231-235 - 2021
- [c37]Roger A. Hallman, George Cybenko:
The Data Deconflation Problem: Moving from Classical to Emerging Solutions. IoTBDS 2021: 375-380 - [c36]Joshua Ackerman, George Cybenko:
Formal Languages, Deep Learning, Topology and AlgebraicWord Problems. SP (Workshops) 2021: 134-141 - 2020
- [j53]Mark Chilenski, George Cybenko, Isaac Dekine, Piyush Kumar, Gil Raz:
Observability Properties of Colored Graphs. IEEE Trans. Netw. Sci. Eng. 7(3): 1687-1696 (2020) - [j52]Mark Chilenski, George Cybenko, Isaac Dekine, Piyush Kumar, Gil Raz:
Analytic Properties of Trackable Weak Models. IEEE Trans. Netw. Sci. Eng. 7(4): 2866-2875 (2020) - [e4]Sushil Jajodia, George Cybenko, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael P. Wellman:
Adaptive Autonomous Secure Cyber Systems. Springer 2020, ISBN 978-3-030-33431-4 [contents] - [i6]Mark Chilenski, George Cybenko, Isaac Dekine, Piyush Kumar, Gil Raz:
Analytic Properties of Trackable Weak Models. CoRR abs/2001.07608 (2020) - [i5]Joshua Ackerman, George Cybenko:
A Survey of Neural Networks and Formal Languages. CoRR abs/2006.01338 (2020)
2010 – 2019
- 2019
- [j51]George Cybenko, Steve Huntsman:
Analytics for directed contact networks. Appl. Netw. Sci. 4(1): 106:1-106:21 (2019) - [c35]George Cybenko:
Graph Models in Tracking Behaviors for Cyber-Security. GraMSec@CSF 2019: 3-6 - [p8]George Cybenko, Michael P. Wellman, Peng Liu, Minghui Zhu:
Overview of Control and Game Theory in Adaptive Cyber Defenses. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 1-11 - [p7]Massimiliano Albanese, Warren Connell, Sridhar Venkatesan, George Cybenko:
Moving Target Defense Quantification. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 94-111 - [p6]Massimiliano Albanese, Sushil Jajodia, Sridhar Venkatesan, George Cybenko, Thanh Hong Nguyen:
Adaptive Cyber Defenses for Botnet Detection and Mitigation. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 156-205 - [p5]Benjamin W. Priest, George Cybenko, Satinder Singh, Massimiliano Albanese, Peng Liu:
Online and Scalable Adaptive Cyber Defense. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 232-261 - [e3]George Cybenko, David J. Pym, Barbara Fila:
5th International Workshop on Graphical Models for Security, held in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC 2018, Oxford, UK, July 8, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11086, Springer 2019, ISBN 978-3-030-15464-6 [contents] - [e2]Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael P. Wellman:
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security. Lecture Notes in Computer Science 11830, Springer 2019, ISBN 978-3-030-30718-9 [contents] - 2018
- [j50]Anne K. Cybenko, George Cybenko:
AI and Fake News. IEEE Intell. Syst. 33(5): 1-5 (2018) - [j49]Katheryn A. Farris, Ankit Shah, George Cybenko, Rajesh Ganesan, Sushil Jajodia:
VULCON: A System for Vulnerability Prioritization, Mitigation, and Management. ACM Trans. Priv. Secur. 21(4): 16:1-16:28 (2018) - [c34]George Cybenko, Gabriel Fortunato Stocco:
Asymptotic Behavior of Attack Graph Games. From Database to Cyber Security 2018: 104-112 - [i4]Mark Chilenski, George Cybenko, Isaac Dekine, Piyush Kumar, Gil Raz:
Control Flow Graph Modifications for Improved RF-Based Processor Tracking Performance. CoRR abs/1809.07223 (2018) - [i3]Mark Chilenski, George Cybenko, Isaac Dekine, Piyush Kumar, Gil Raz:
Observability Properties of Colored Graphs. CoRR abs/1811.04803 (2018) - 2017
- [c33]George Cybenko:
Parallel Computing for Machine Learning in Social Network Analysis. IPDPS Workshops 2017: 1464-1471 - 2016
- [c32]Sridhar Venkatesan, Massimiliano Albanese, George Cybenko, Sushil Jajodia:
A Moving Target Defense Approach to Disrupting Stealthy Botnets. MTD@CCS 2016: 37-46 - [c31]George Cybenko:
ParSocial 2016 Keynote. IPDPS Workshops 2016: 1795 - [p4]George Cybenko, Gabriel Stocco, Patrick Sweeney:
Quantifying Covertness in Deceptive Cyber Operations. Cyber Deception 2016: 53-69 - 2015
- [c30]George Cybenko, Dijiang Huang:
MTD 2015: Second ACM Workshop on Moving Target Defense. CCS 2015: 1709-1710 - [c29]George Cybenko:
Deep Learning of Behaviors for Security. IWSPA@CODASPY 2015: 1 - [c28]Wenyaw Chan, George Cybenko, Murat Kantarcioglu, Ernst L. Leiss, Thamar Solorio, Bhavani Thuraisingham, Rakesh M. Verma:
Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students. IWSPA@CODASPY 2015: 55-57 - [p3]Patrick Sweeney, George Cybenko:
Identifying and Exploiting the Cyber High Ground for Botnets. Cyber Warfare 2015: 37-56 - [e1]George Cybenko, Dijiang Huang:
Proceedings of the Second ACM Workshop on Moving Target Defense, MTD 2015, Denver, Colorado, USA, October 12, 2015. ACM 2015, ISBN 978-1-4503-3823-3 [contents] - 2014
- [j48]George Cybenko, Kathy Clark-Fisher:
IEEE Security & Privacy: The Early Years. IEEE Secur. Priv. 12(3): 18-19 (2014) - [j47]George Cybenko, Eunice E. Santos:
Inaugural Issue Editorial. IEEE Trans. Comput. Soc. Syst. 1(1): 1-2 (2014) - [c27]George Cybenko, Jeff Hughes:
No free lunch in cyber security. MTD@CCS 2014: 1-12 - [c26]George Cybenko, Sushil Jajodia, Michael P. Wellman, Peng Liu:
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation. ICISS 2014: 1-8 - 2013
- [j46]Valentino Crespi, George Cybenko, Annarita Giani:
Engineering Statistical Behaviors for Attacking and Defending Covert Channels. IEEE J. Sel. Top. Signal Process. 7(1): 124-136 (2013) - [p2]Daniel Bilar, George Cybenko, John P. Murphy:
Adversarial Dynamics: The Conficker Case Study. Moving Target Defense 2013: 41-71 - 2012
- [j45]George Cybenko, Carl E. Landwehr:
Security Analytics and Measurements. IEEE Secur. Priv. 10(3): 5-8 (2012) - [c25]Vincent H. Berk, George Cybenko, Ian D. Gregorio-De Souza, John P. Murphy:
Managing Malicious Insider Risk through BANDIT. HICSS 2012: 2422-2430 - 2011
- [j44]George Cybenko, Valentino Crespi:
Learning Hidden Markov Models Using Nonnegative Matrix Factorization. IEEE Trans. Inf. Theory 57(6): 3963-3970 (2011) - [c24]Gabriel Fortunato Stocco, George Cybenko:
Exploiting Adversary's Risk Profiles in Imperfect Information Security Games. GameSec 2011: 22-33 - [i2]Valentino Crespi, George Cybenko, Annarita Giani:
Attacking and Defending Covert Channels and Behavioral Models. CoRR abs/1104.5071 (2011) - 2010
- [c23]Alexy Khrabrov, George Cybenko:
Discovering Influence in Communication Networks Using Dynamic Graph Analysis. SocialCom/PASSAT 2010: 288-294
2000 – 2009
- 2009
- [c22]Dave Twardowski, Robert Savell, George Cybenko:
Process learning of network interactions in market microstructures. CIFEr 2009: 51-57 - [c21]Alexy Khrabrov, George Cybenko:
A Language of Life: Characterizing People Using Cell Phone Tracks. CSE (4) 2009: 495-501 - 2008
- [j43]Lawrence Carin, George Cybenko, Jeff Hughes:
Cybersecurity Strategies: The QuERIES Methodology. Computer 41(8): 20-26 (2008) - [j42]Valentino Crespi, George Cybenko, Guofei Jiang:
The theory of trackability with applications to sensor networks. ACM Trans. Sens. Networks 4(3): 16:1-16:42 (2008) - [i1]George Cybenko, Valentino Crespi:
Learning Hidden Markov Models using Non-Negative Matrix Factorization. CoRR abs/0809.4086 (2008) - 2007
- [j41]George Cybenko, Vincent H. Berk:
Process Query Systems. Computer 40(1): 62-70 (2007) - [j40]Jason I. Hong, Mahadev Satyanarayanan, George Cybenko:
Guest Editors' Introduction: Security & Privacy. IEEE Pervasive Comput. 6(4): 15-17 (2007) - 2006
- [j39]George Cybenko:
Why Johnny Can't Evaluate Security Risk. IEEE Secur. Priv. 4(1): 5 (2006) - [j38]George Cybenko:
Weak Links, Strong Ties. IEEE Secur. Priv. 4(6): 3 (2006) - [j37]Guofei Jiang, George Cybenko, James A. Hendler:
Semantic Interoperability and Information Fluidity. Int. J. Cooperative Inf. Syst. 15(1): 1-22 (2006) - [c20]George Cybenko, Vincent H. Berk, Ian D. Gregorio-De Souza, Chad Behre:
Practical Autonomic Computing. COMPSAC (1) 2006: 3-14 - 2005
- [j36]John Yen, Robert L. Popp, George Cybenko, Latanya Sweeney, Paul Rosenzweig:
Homeland Security. IEEE Intell. Syst. 20(5): 76-86 (2005) - [j35]George Cybenko:
The One-Eyed Man Is King. IEEE Secur. Priv. 3(4): 4-5 (2005) - [j34]Diego Hernando, Valentino Crespi, George Cybenko:
Efficient computation of the hidden Markov model entropy for a given observation sequence. IEEE Trans. Inf. Theory 51(7): 2681-2685 (2005) - [c19]Christopher Roblee, Vincent H. Berk, George Cybenko:
Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. ICAC 2005: 123-133 - [c18]Yong Sheng, George Cybenko:
Distance measures for nonparametric weak process models. SMC 2005: 722-727 - 2004
- [j33]Guofei Jiang, George Cybenko:
Functional Validation in Grid Computing. Auton. Agents Multi Agent Syst. 8(2): 119-130 (2004) - [j32]George Cybenko, Annarita Giani, Paul Thompson:
Cognitive Hacking. Adv. Comput. 60: 35-73 (2004) - [j31]George Cybenko:
From the Editors: Don't Bring a Knife to a Gunfight. IEEE Secur. Priv. 2(2): 5 (2004) - [j30]George Cybenko:
Security Alchemy. IEEE Secur. Priv. 2(6): 5 (2004) - [c17]Guofei Jiang, George Cybenko:
Temporal and spatial distributed event correlation for network security. ACC 2004: 996-1001 - [p1]Paul Thompson, George Cybenko, Annarita Giani:
Cognitive Hacking. Economics of Information Security 2004: 255-287 - 2003
- [j29]George Cybenko:
A Critical Need, An Ambitious Mission, A New Magazine. IEEE Secur. Priv. 1(1): 5-9 (2003) - [j28]George Cybenko:
From the Editor: Sapphire/Slammer Redux. IEEE Secur. Priv. 1(2): 6 (2003) - [j27]George Cybenko:
Boiling Frogs? IEEE Secur. Priv. 1(4): 5 (2003) - [j26]George Cybenko:
From the Editors: Privacy Is the Issue. IEEE Secur. Priv. 1(6): 5-7 (2003) - [c16]Javed A. Aslam, Zack J. Butler, Florin Constantin, Valentino Crespi, George Cybenko, Daniela Rus:
Tracking a moving object with a binary sensor network. SenSys 2003: 150-161 - [c15]Guofei Jiang, George Cybenko, James A. Hendler:
Semantic depth and markup complexity. SMC 2003: 2138-2143 - 2002
- [j25]George Cybenko, Annarita Giani, Paul Thompson:
Cognitive Hacking: A Battle for the Mind. Computer 35(8): 50-56 (2002) - [j24]George Cybenko:
Understanding Quantum Computing [Book Review]. Comput. Sci. Eng. 4(4): 92 (2002) - [j23]David Kotz, George Cybenko, Robert S. Gray, Guofei Jiang, Ronald A. Peterson, Martin O. Hofmann, Daria A. Chacón, Kenneth R. Whitebread, James A. Hendler:
Performance Analysis of Mobile Agents for Filtering Data Streams on Wireless Networks. Mob. Networks Appl. 7(2): 163-174 (2002) - [j22]Robert S. Gray, George Cybenko, David Kotz, Ronald A. Peterson, Daniela Rus:
D'Agents: Applications and performance of a mobile-agent system. Softw. Pract. Exp. 32(6): 543-573 (2002) - [j21]Santiago Aja-Fernández, Carlos Alberola-López, George Cybenko:
A fuzzy MHT algorithm applied to text-based information tracking. IEEE Trans. Fuzzy Syst. 10(3): 360-374 (2002) - [c14]Guofei Jiang, George Cybenko:
Query routing optimization in sensor communication networks. CDC 2002: 1999-2004 - 2001
- [j20]George Cybenko:
Reducing quantum computations to elementary unitary operations. Comput. Sci. Eng. 3(2): 27-32 (2001) - [j19]George Cybenko:
Machine learning [Book Review]. Comput. Sci. Eng. 3(3): 95-96 (2001) - [j18]Katsuhiro Moizumi, George Cybenko:
The Traveling Agent Problem. Math. Control. Signals Syst. 14(3): 213-232 (2001) - 2000
- [j17]Brian E. Brewington, George Cybenko:
How dynamic is the Web? Comput. Networks 33(1-6): 257-276 (2000) - [j16]Brian E. Brewington, George Cybenko:
Keeping Up with the Changing Web. Computer 33(5): 52-58 (2000) - [c13]David Kotz, Guofei Jiang, Robert S. Gray, George Cybenko, Ronald A. Peterson:
Performance analysis of mobile agents for filtering data streams on wireless networks. MSWiM 2000: 85-94
1990 – 1999
- 1999
- [j15]Carl J. Beckmann, George Cybenko:
Computation in Communication. Comput. Sci. Eng. 1(1): 22 (1999) - [j14]Carl J. Beckmann, Donald McManus, George Cybenko:
Horizons in scientific and distributed computing. Comput. Sci. Eng. 1(1): 23-30 (1999) - [j13]Carlos Alberola-López, George V. Cybenko:
Tracking with text-based messages. IEEE Intell. Syst. 14(4): 70-78 (1999) - 1998
- [j12]Wilmer Caripe, George Cybenko, Katsuhiro Moizumi, Robert Gray:
Network awareness and mobile agent systems. IEEE Commun. Mag. 36(7): 44-49 (1998) - [c12]Robert S. Gray, David Kotz, George Cybenko, Daniela Rus:
D'Agents: Security in a Multiple-Language, Mobile-Agent System. Mobile Agents and Security 1998: 154-187 - [c11]Kenneth N. Ross, Ronald D. Chaney, George V. Cybenko, Daniel J. Burroughs, Alan S. Willsky:
Mobile agents in adaptive hierarchical Bayesian networks for global awareness. SMC 1998: 2207-2212 - 1997
- [j11]David Kotz, Robert S. Gray, Saurab Nog, Daniela Rus, Sumit Chawla, George Cybenko:
AGENT TCL: Targeting the Needs of Mobile Computers. IEEE Internet Comput. 1(4): 58-67 (1997) - [c10]George Cybenko:
High Performance Wireless Computing. ISHPC 1997: 71 - 1996
- [j10]George Cybenko:
Large-Scope Computing: The Industrial Challenges. ACM Comput. Surv. 28(4es): 21 (1996) - 1993
- [j9]George Cybenko:
Computation & Cognition (C. William Gear). SIAM Rev. 35(1): 147-148 (1993) - [j8]Sirpa Saarinen, Randall Bramley, George Cybenko:
Ill-Conditioning in Neural Network Training Problems. SIAM J. Sci. Comput. 14(3): 693-714 (1993) - 1992
- [j7]George Cybenko:
Approximation by superpositions of a sigmoidal function. Math. Control. Signals Syst. 5(4): 455 (1992) - [j6]David W. Krumme, George Cybenko, K. N. Venkataraman:
Gossiping in Minimal Time. SIAM J. Comput. 21(1): 111-139 (1992) - 1991
- [j5]Michael W. Berry, George Cybenko, John L. Larson:
Scientific benchmark characterizations. Parallel Comput. 17(10-11): 1173-1194 (1991) - [c9]David K. Bradley, George Cybenko, John L. Larson, F. Ahmad, J. Golab, Mark Straka:
Supercomputer workload decomposition and analysis. ICS 1991: 458-467 - [c8]Allan Tuchman, George Cybenko, David Jablonowski, Brian Bliss, Sanjay Sharma:
Vista: A System for Remote Data Visualization. PP 1991: 575-580 - [c7]Allan Tuchman, David Jablonowski, George Cybenko:
Run-Time Visualization of Program Data. IEEE Visualization 1991: 255-261 - 1990
- [c6]George Cybenko:
Complexity Theory of Neural Networks and Classification Problems. EURASIP Workshop 1990: 26-44 - [c5]George Cybenko, Lyle D. Kipp, Lynn Pointer, David J. Kuck:
Supercomputer performance evaluation and the Perfect Benchmarks. ICS 1990: 254-266
1980 – 1989
- 1989
- [j4]George Cybenko:
Dynamic Load Balancing for Distributed Memory Multiprocessors. J. Parallel Distributed Comput. 7(2): 279-301 (1989) - [j3]George Cybenko:
Approximation by superpositions of a sigmoidal function. Math. Control. Signals Syst. 2(4): 303-314 (1989) - 1988
- [j2]George Cybenko, T. G. Allen, J. E. Polito:
Practical parallel Union-Find algorithms for transitive closure and clustering. Int. J. Parallel Program. 17(5): 403-423 (1988) - 1987
- [j1]George Cybenko, David W. Krumme, K. N. Venkataraman:
Fixed Hypercube Embedding. Inf. Process. Lett. 25(1): 35-39 (1987) - [c4]David W. Krumme, George Cybenko, Alva L. Couch:
Instrumentation for distributed computing systems. FJCC 1987: 344 - [c3]George Cybenko, Tom Allen:
Recursive Binary Partitions-Abstract. PP 1987: 212 - 1986
- [c2]George Cybenko, David W. Krumme, K. N. Venkataraman:
Simultaneous Broadcasting in Multiprocessor Networks. ICPP 1986: 555-558
1970 – 1979
- 1979
- [c1]George Cybenko:
Round-off error propagation in Durbin's, Levinson's, and Trench's algorithms. ICASSP 1979: 498-501
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint