default search action
Michael Atighetchi
Person information
- affiliation: BBN Technologies
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c45]Shou Matsumoto, Alexandre Barreto, Paulo C. G. Costa, Brett Benyo, Michael Atighetchi, Daniel Javorsek:
Dynamic Explanation of Bayesian Networks with Abductive Bayes Factor Qualitative Propagation and Entropy-Based Qualitative Explanation. FUSION 2021: 1-9 - [c44]David Last, Michael Atighetchi, Partha P. Pal, Ryan Toner:
Using Distributed Ledgers For Command and Control - Concepts and Challenges. MILCOM 2021: 55-60 - [c43]Joud Khoury, Zachary B. Ratliff, Michael Atighetchi:
Towards Decentralized and Provably Secure Cross-Domain Solutions. STM 2021: 185-203 - 2020
- [c42]Fusun Yaman, Thomas C. Eskridge, Aaron Adler, Michael Atighetchi, Borislava I. Simidchieva, Sarah Jeter, Jennifer Cassetti, Jeffrey DeMatteis:
An Autonomous Resiliency Toolkit for Cyber Defense Platforms. ICAART (2) 2020: 240-248
2010 – 2019
- 2019
- [c41]Aaron Adler, Peter Samouelian, Michael Atighetchi, Yat Fu:
Remote Management of Boundary Protection Devices with Information Restrictions. AAAI 2019: 9398-9403 - [c40]Tim Strayer, Ram Ramanathan, Daniel Coffin, Samuel C. Nelson, Michael Atighetchi, Aaron Adler, Stephane Blais, Bishal Thapa, William N. Tetteh, Vladimir Shurbanov, Karen Zita Haigh, Regina Hain, Colleen T. Rock, Emily H. Do, Armando Caro, Daniel Ellard, Michael J. Beckerle, Stephen Lawrence, Scott Loos:
Mission-Centric Content Sharing Across Heterogeneous Networks. ICNC 2019: 1034-1038 - [c39]Michael Atighetchi, Borislava I. Simidchieva, Katarzyna Olejnik:
Security Requirements Analysis - A Vision for an Automated Toolchain. QRS Companion 2019: 97-104 - 2017
- [c38]Michael Atighetchi, Fusun Yaman, David Last, Nicholas Paltzer, Meghan Caiazzo, Stephen Raio:
A Flexible Approach Towards Security Validation. SafeConfig@CCS 2017: 7-13 - 2016
- [c37]Michael Atighetchi, Borislava I. Simidchieva, Marco M. Carvalho, David Last:
Experimentation Support for Cyber Security Evaluations. CISRC 2016: 5:1-5:7 - [c36]Michael Atighetchi, Fusun Yaman, Borislava I. Simidchieva, Marco M. Carvalho:
An autonomous resiliency toolkit - needs, challenges, and concepts for next generation cyber defense platforms. MILCOM 2016: 1-6 - [c35]Marco M. Carvalho, Thomas C. Eskridge, Michael Atighetchi, Nicholas Paltzer:
Semi-automated wrapping of defenses (SAWD) for cyber command and control. MILCOM 2016: 19-24 - [c34]Michael Atighetchi, Borislava I. Simidchieva, Fusun Yaman, Thomas C. Eskridge, Marco M. Carvalho, Nicholas Paltzer:
Using Ontologies to Quantify Attack Surfaces. STIDS 2016: 10-18 - 2015
- [c33]Michael J. Mayhew, Michael Atighetchi, Aaron Adler, Rachel Greenstadt:
Use of machine learning in big data analytics for insider threat detection. MILCOM 2015: 915-922 - 2014
- [c32]Partha P. Pal, Michael Atighetchi, Nathaniel Soule, Vatche Ishakian, Joseph P. Loyall, Robert Grant, Asher Sinclair:
Secure and QoS-Managed Information Exchange Between Enterprise and Constrained Environments. ISORC 2014: 141-149 - [c31]Michael Atighetchi, John Griffith, Ian Emmons, David Mankins, Richard P. Guidorizzi:
Federated Access to Cyber Observables for Detection of Targeted Attacks. MILCOM 2014: 60-66 - 2013
- [c30]Michael Atighetchi, Nathaniel Soule, Partha P. Pal, Joseph P. Loyall, Asher Sinclair, Robert Grant:
Safe configuration of TLS connections. CNS 2013: 415-422 - [c29]Jeffrey Segall, Michael J. Mayhew, Michael Atighetchi, Rachel Greenstadt:
Assessing trustworthiness in collaborative environments. CSIIRW 2013: 52 - [c28]Aaron Adler, Michael J. Mayhew, Jeffrey Cleveland, Michael Atighetchi, Rachel Greenstadt:
Using Machine Learning for Behavior-Based Access Control: Scalable Anomaly Detection on TCP Connections and HTTP Requests. MILCOM 2013: 1880-1887 - 2012
- [c27]Michael Atighetchi, Partha P. Pal, Joseph P. Loyall, Asher Sinclair:
Avoiding common security flaws in composed service-oriented systems. DSN Workshops 2012: 1-6 - [c26]Partha P. Pal, Michael Atighetchi, Andrew Gronosky, Joseph P. Loyall, Charles Payne, Asher Sinclair, Brandon Froberg, Robert Grant:
Cooperative red teaming of a prototype surivable service-oriented system. MILCOM 2012: 1-6 - 2011
- [j4]Michael Atighetchi, Brett Benyo, Abhimanyu Gosain, Robert MacIntyre, Partha P. Pal, Virginia Travers, John A. Zinky:
Transparent Insertion of Custom Logic in HTTP(S) Streams Using PbProxy. IEEE Internet Comput. 15(3): 43-50 (2011) - [c25]Joseph P. Loyall, Kurt Rohloff, Partha P. Pal, Michael Atighetchi:
A Survey of Security Concepts for Common Operating Environments. ISORC Workshops 2011: 244-253 - 2010
- [c24]Jacob Beal, Jonathan Webb, Michael Atighetchi:
Adjustable autonomy for cross-domain entitlement decisions. AISec 2010: 65-71 - [c23]Amy Fedyk, Michael Atighetchi, Partha P. Pal:
Leveraging ESM platforms for continuous mission-oriented assessment of information assurance. CNSM 2010: 234-237 - [c22]Michael Atighetchi, Andrew Gronosky, Partha P. Pal, Joseph P. Loyall:
Usable Survivability. INC 2010: 209-212 - [c21]Partha P. Pal, Michael Atighetchi, Joseph P. Loyall, Andrew Gronosky, Charles Payne, Robert Hillman:
Advanced Protected Services - A Concept Paper on Survivable Service-Oriented Systems. ISORC Workshops 2010: 158-165 - [c20]Andrew Gronosky, Michael Atighetchi, Partha P. Pal:
Understanding the Vulnerabilities of a SOA Platform - A Case Study. NCA 2010: 182-187 - [c19]Michael Atighetchi, Jonathan Webb, Partha P. Pal, Joseph P. Loyall, Azer Bestavros, Michael J. Mayhew:
Dynamic cross domain information sharing: a concept paper on flexible adaptive policy management. SafeConfig 2010: 83-88 - [c18]Partha P. Pal, Kurt Rohloff, Michael Atighetchi, Richard E. Schantz:
Managed Mission Assurance - Concept, Methodology and Runtime Support. SocialCom/PASSAT 2010: 1159-1164
2000 – 2009
- 2009
- [c17]Michael Atighetchi, Partha P. Pal:
From Auto-adaptive to Survivable and Self-Regenerative Systems. NCA 2009: 98-101 - [c16]Michael Atighetchi, Partha P. Pal:
Attribute-Based Prevention of Phishing Attacks. NCA 2009: 266-269 - 2008
- [c15]Paul Rubel, Michael Atighetchi, Partha P. Pal, Martin W. Fong, Richard O'Brien:
Effective Monitoring of a Survivable Distributed Networked Information System. ARES 2008: 1306-1312 - [c14]Franklin Webber, Partha P. Pal, Paul Rubel, Michael Atighetchi:
An abstract interface for cyber-defense mechanisms. CSIIRW 2008: 37:1-37:3 - [c13]Paul Rubel, Partha P. Pal, Michael Atighetchi, D. Paul Benjamin, Franklin Webber:
Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response. RAID 2008: 408-409 - 2006
- [j3]Partha P. Pal, Paul Rubel, Michael Atighetchi, Franklin Webber, William H. Sanders, Mouna Seri, HariGovind V. Ramasamy, James Lyons, Tod Courtney, Adnan Agbaria, Michel Cukier, Jeanna M. Gossett, Idit Keidar:
An architecture for adaptive intrusion-tolerant applications. Softw. Pract. Exp. 36(11-12): 1331-1354 (2006) - [c12]Partha P. Pal, Franklin Webber, Michael Atighetchi, Nate Combs:
Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing. NCA 2006: 285-292 - 2005
- [j2]Christopher D. Gill, Jeanna M. Gossett, David Corman, Joseph P. Loyall, Richard E. Schantz, Michael Atighetchi, Douglas C. Schmidt:
Integrated Adaptive QoS Management in Middleware: A Case Study. Real Time Syst. 29(2-3): 101-130 (2005) - [c11]Jennifer Chong, Partha P. Pal, Michael Atighetchi, Paul Rubel, Franklin Webber:
Survivability Architecture of a Mission Critical System: The DPASA Example. ACSAC 2005: 495-504 - [c10]Michael Atighetchi, Paul Rubel, Partha P. Pal, Jennifer Chong, Lyle Sudin:
Networking Aspects in the DPASA Survivability Architecture: An Experience Report. NCA 2005: 219-222 - 2004
- [j1]Michael Atighetchi, Partha P. Pal, Franklin Webber, Richard E. Schantz, Christopher C. Jones, Joseph P. Loyall:
Adaptive Cyberdefense for Survival and Intrusion Tolerance. IEEE Internet Comput. 8(6): 25-33 (2004) - [c9]Christopher D. Gill, Joseph P. Loyall, Richard E. Schantz, Michael Atighetchi, Jeanna M. Gossett, David Corman, Douglas C. Schmidt:
Integrated Adaptive QoS Management in Middleware: A Case Study. IEEE Real-Time and Embedded Technology and Applications Symposium 2004: 276-285 - 2003
- [c8]Michael Atighetchi, Partha P. Pal, Christopher C. Jones, Paul Rubel, Richard E. Schantz, Joseph P. Loyall, John A. Zinky:
Building Auto-Adaptive Distributed Applications: The QuO-APOD Experience. ICDCS Workshops 2003: 104- - [c7]Michael Atighetchi, Partha P. Pal, Franklin Webber, Christopher C. Jones:
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense. ISORC 2003: 183-192 - [c6]Michael Atighetchi, Partha P. Pal, Franklin Webber, Christopher C. Jones:
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense. NCA 2003: 179-190 - 2002
- [c5]Richard E. Schantz, Joseph P. Loyall, Michael Atighetchi, Partha P. Pal:
Packaging Quality of Service Control Behaviors for Reuse. Symposium on Object-Oriented Real-Time Distributed Computing 2002: 375-385 - 2001
- [c4]Joseph P. Loyall, Richard E. Schantz, John A. Zinky, Partha P. Pal, Richard Shapiro, Craig Rodrigues, Michael Atighetchi, David A. Karr, Jeanna M. Gossett, Christopher D. Gill:
Comparing and Contrasting Adaptive Middleware Support in Wide-Area and Embedded Distributed Object Applications. ICDCS 2001: 625-634
1990 – 1999
- 1999
- [c3]David D. Jensen, Michael Atighetchi, Régis Vincent, Victor R. Lesser:
Learning Quantitative Knowledge for Multiagent Coordination. AAAI/IAAI 1999: 24-31 - [c2]Victor R. Lesser, Michael Atighetchi, Brett Benyo, Bryan Horling, Anita Raja, Régis Vincent, Thomas Wagner, Ping Xuan, Xiaoqin Zhang:
The UMASS Intelligent Home Project. Agents 1999: 291-298 - 1998
- [c1]Justus H. Piater, Paul R. Cohen, Xiaoqin Zhang, Michael Atighetchi:
A Randomized ANOVA Procedure for Comparing Performance Curves. ICML 1998: 430-438
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint