Follow
Stephen Moskal
Stephen Moskal
Verified email at csail.mit.edu
Title
Cited by
Cited by
Year
Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach
S Moskal, SJ Yang, ME Kuhl
The Journal of Defense Modeling and Simulation 15 (1), 13-29, 2018
422018
Alert-driven attack graph generation using s-pdfa
A Nadeem, S Verwer, S Moskal, SJ Yang
IEEE transactions on dependable and secure computing 19 (2), 731-746, 2021
362021
Context model fusion for multistage network attack simulation
S Moskal, B Wheeler, D Kreider, ME Kuhl, SJ Yang
2014 IEEE Military Communications Conference, 158-163, 2014
262014
Session-level adversary intent-driven cyberattack simulator
M Drašar, S Moskal, S Yang, P Zat'ko
2020 IEEE/ACM 24th International Symposium on Distributed Simulation and …, 2020
232020
Extracting and evaluating similar and unique cyber attack strategies from intrusion alerts
S Moskal, SJ Yang, ME Kuhl
2018 IEEE international conference on intelligence and security informatics …, 2018
232018
Sage: Intrusion alert-driven attack graph extractor
A Nadeem, S Verwer, SJ Yang
2021 IEEE symposium on visualization for cyber security (VizSec), 36-41, 2021
142021
Cyberattack action-intent-framework for mapping intrusion observables
S Moskal, SJ Yang
arXiv preprint arXiv:2002.07838, 2020
112020
Simulating attack behaviors in enterprise networks
S Moskal, D Kreider, L Hays, B Wheeler, SJ Yang, M Kuhl
2013 IEEE Conference on Communications and Network Security (CNS), 359-360, 2013
112013
Framework to describe intentions of a cyber attack action
S Moskal, SJ Yang
arXiv preprint arXiv:2002.07838, 2020
102020
Enabling visual analytics via alert-driven attack graphs
A Nadeem, S Verwer, S Moskal, SJ Yang
Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021
82021
Who shall we follow in twitter for cyber vulnerability?
B Cui, S Moskal, H Du, SJ Yang
Social Computing, Behavioral-Cultural Modeling and Prediction: 6th …, 2013
82013
Translating intrusion alerts to cyberattack stages using pseudo-active transfer learning (PATRL)
S Moskal, SJ Yang
2021 IEEE conference on communications and network security (CNS), 110-118, 2021
72021
Knowledge-based decision making for simulating cyber attack behaviors
SF Moskal
Rochester Institute of Technology, 2016
72016
On the variety and veracity of cyber intrusion alerts synthesized by generative adversarial networks
C Sweet, S Moskal, SJ Yang
ACM Transactions on Management Information Systems (TMIS) 11 (4), 1-21, 2020
62020
Assessing the likelihood of cyber network infiltration using rare-event simulation
AL Krall, ME Kuhl, SF Moskal, SJ Yang
2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-7, 2016
52016
Synthetic intrusion alert generation through generative adversarial networks
C Sweet, S Moskal, SJ Yang
MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM), 1-6, 2019
42019
LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing
S Moskal, S Laney, E Hemberg, UM O'Reilly
arXiv preprint arXiv:2310.06936, 2023
22023
HeAt PATRL: Network-Agnostic Cyber Attack Campaign Triage with Pseudo-Active Transfer Learning
SF Moskal
Rochester Institute of Technology, 2021
22021
Assessing Large Language Model’s knowledge of threat behavior in MITRE ATT&CK
E Garza, E Hemberg, S Moskal, UM O’Reilly
12023
CyberEvo: evolutionary search of knowledge-based behaviors in a cyber attack campaign
S Moskal, E Hemberg, UM O'Reilly
Proceedings of the Genetic and Evolutionary Computation Conference Companion …, 2022
12022
The system can't perform the operation now. Try again later.
Articles 1–20