Linking threat tactics, techniques, and patterns with defensive weaknesses, vulnerabilities and affected platform configurations for cyber hunting E Hemberg, J Kelly, M Shlapentokh-Rothman, B Reinstadler, K Xu, ... arXiv preprint arXiv:2010.00533, 2020 | 50 | 2020 |
Language agent tree search unifies reasoning acting and planning in language models A Zhou, K Yan, M Shlapentokh-Rothman, H Wang, YX Wang arXiv preprint arXiv:2310.04406, 2023 | 23 | 2023 |
Learning curves for analysis of deep networks D Hoiem, T Gupta, Z Li, M Shlapentokh-Rothman International conference on machine learning, 4287-4296, 2021 | 21 | 2021 |
Coevolutionary modeling of cyber attack patterns and mitigations using public datasets M Shlapentokh-Rothman, J Kelly, A Baral, E Hemberg, UM O'Reilly Proceedings of the Genetic and Evolutionary Computation Conference, 714-722, 2021 | 10 | 2021 |
Securing the software defined perimeter with evolutionary co-optimization M Shlapentokh-Rothman, E Hemberg, UM O'Reilly Proceedings of the 2020 Genetic and Evolutionary Computation Conference …, 2020 | 8 | 2020 |
Unifying public threat knowledge for cyber hunting M Shlapentokh-Rothman Massachusetts Institute of Technology, 2020 | 2 | 2020 |
Webwise: Web interface control and sequential exploration with large language models H Tao, S TV, M Shlapentokh-Rothman, D Hoiem, H Ji arXiv preprint arXiv:2310.16042, 2023 | 1 | 2023 |
Region-Based Representations Revisited M Shlapentokh-Rothman, A Blume, Y Xiao, Y Wu, S TV, H Tao, JY Lee, ... arXiv preprint arXiv:2402.02352, 2024 | | 2024 |
Bron-linking attack tactics, techniques, and patterns with defensive weaknesses, vulnerabilities and affected platform configurations E Hemberg, J Kelly, M Shlapentokh-Rothman, B Reinstadler, K Xu, ... arXiv preprint arXiv:2010.00533, 2020 | | 2020 |