Achieving rapport with turn-by-turn, user-responsive emotional coloring JC Acosta, NG Ward Speech Communication 53 (9-10), 1137-1148, 2011 | 96 | 2011 |
Survey and taxonomy of adversarial reconnaissance techniques S Roy, N Sharmin, JC Acosta, C Kiekintveld, A Laszka ACM Computing Surveys 55 (6), 1-38, 2022 | 38 | 2022 |
Using emotion to gain rapport in a spoken dialog system JC Acosta | 27 | 2009 |
Responding to user emotional state by adding emotional coloring to utterances. JC Acosta, NG Ward INTERSPEECH, 1587-1590, 2009 | 19 | 2009 |
Cybersecurity deception experimentation system JC Acosta, A Basak, C Kiekintveld, N Leslie, C Kamhoua 2020 IEEE Secure Development (SecDev), 34-40, 2020 | 17 | 2020 |
Lightweight on-demand honeypot deployment for cyber deception JC Acosta, A Basak, C Kiekintveld, C Kamhoua International Conference on Digital Forensics and Cyber Crime, 294-312, 2021 | 14 | 2021 |
Augmenting attack graphs to represent data link and network layer vulnerabilities JC Acosta, E Padilla, J Homer MILCOM 2016-2016 IEEE Military Communications Conference, 1010-1015, 2016 | 13 | 2016 |
A platform for evaluator-centric cybersecurity training and data acquisition JC Acosta, J McKee, A Fielder, S Salamah MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 394-399, 2017 | 11 | 2017 |
Deep learning for cyber deception in wireless networks FO Olowononi, AH Anwar, DB Rawat, JC Acosta, CA Kamhoua 2021 17th International Conference on Mobility, Sensing and Networking (MSN …, 2021 | 8 | 2021 |
A framework for profiling multiprocessor memory performance D Villa, J Acosta, PJ Teller, B Olszewski, T Morgan Proceedings. Tenth International Conference on Parallel and Distributed …, 2004 | 8 | 2004 |
An efficient common substrings algorithm for on-the-fly behavior-based malware detection and analysis JC Acosta, H Mendoza, BG Medina MILCOM 2012-2012 IEEE Military Communications Conference, 1-6, 2012 | 7 | 2012 |
Survivability prediction of ad hoc networks under attack JC Acosta, BG Medina MILCOM 2012-2012 IEEE Military Communications Conference, 1-6, 2012 | 7 | 2012 |
Bayesian models for node-based inference techniques N Sharmin, S Roy, A Laszka, J Acosta, C Kiekintveld 2023 IEEE International Systems Conference (SysCon), 1-8, 2023 | 6 | 2023 |
Software diversity for cyber deception AB Sarr, AH Anwar, C Kamhoua, N Leslie, J Acosta GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020 | 6 | 2020 |
Evaluating usability of permissioned blockchain for internet-of-battlefield things security ED Buenrostro, AOG Rivera, D Tosh, JC Acosta, L Njilla MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM), 841-846, 2019 | 6 | 2019 |
Poster: Toward Dynamic, Session-Preserving, Transition from Low to High Interaction Honeypots JC Acosta Proceedings of the 27th ACM on Symposium on Access Control Models and …, 2022 | 5 | 2022 |
Network data curation toolkit: cybersecurity data collection, aided-labeling, and rule generation JC Acosta, S Medina, J Ellis, L Clarke, V Rivas, A Newcomb MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM), 849-854, 2021 | 5 | 2021 |
Cybersecurity methodology for specialized behavior analysis E Padilla, JC Acosta, CD Kiekintveld Digital Forensics and Cyber Crime: 11th EAI International Conference, ICDF2C …, 2021 | 5 | 2021 |
Achieving sensor identification and data flow integrity in critical cyber-physical infrastructures AOG Rivera, DK Tosh, JC Acosta, L Njilla 2020 IEEE International Conference on Communications, Control, and Computing …, 2020 | 5 | 2020 |
Repeatable experimentation for cybersecurity moving target defense JC Acosta, L Clarke, S Medina, M Akbar, M Shahriar Hossain, ... Security and Privacy in Communication Networks: 17th EAI International …, 2021 | 4 | 2021 |