A linked data platform for mining software repositories I Keivanloo, C Forbes, A Hmood, M Erfani, C Neal, G Peristerakis, ... 2012 9th IEEE Working Conference on Mining Software Repositories (MSR), 32-35, 2012 | 68 | 2012 |
Reinforcement learning based penetration testing of a microgrid control algorithm C Neal, H Dagdougui, A Lodi, JM Fernandez 2021 IEEE 11th Annual Computing and Communication Workshop and Conference …, 2021 | 12 | 2021 |
Attacker attribution via characteristics inference using honeypot data P Crochelet, C Neal, NB Cuppens, F Cuppens International Conference on Network and System Security, 155-169, 2022 | 2 | 2022 |
Evading deep reinforcement learning-based network intrusion detection with adversarial attacks MA Merzouk, J Delas, C Neal, F Cuppens, N Boulahia-Cuppens, R Yaich Proceedings of the 17th International Conference on Availability …, 2022 | 2 | 2022 |
Ontology-Based Anomaly Detection for Air Traffic Control Systems C Neal, JY De Miceli, D Barrera, J Fernandez arXiv preprint arXiv:2207.00637, 2022 | 2 | 2022 |
Advancements in Hardening the Cybersecurity Posture of Nuclear Power Plant Defence-In-Depth Network Architecture C Neal, D Trask, K Thiyagarajan, R Doucet, P Adamson, M Daley, ... | 2 | 2020 |
Notes on generating satisfiable SAT instances using random subgraph isomorphism C Anton, C Neal Advances in Artificial Intelligence: 23rd Canadian Conference on Artificial …, 2010 | 2 | 2010 |
Optimal Automated Generation of Playbooks KA Saint-Hilaire, C Neal, F Cuppens, N Boulahia-Cuppens, M Hadji Data and Applications Security and Privacy XXXVIII: 38th Annual IFIP WG 11.3 …, 2024 | | 2024 |
Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection V Aurora, C Neal, A Proulx, N Boulahia Cuppens, F Cuppens International Symposium on Foundations and Practice of Security, 53-68, 2023 | | 2023 |
Automated Attacker Behaviour Classification Using Threat Intelligence Insights P Crochelet, C Neal, N Boulahia Cuppens, F Cuppens, A Proulx International Symposium on Foundations and Practice of Security, 285-301, 2023 | | 2023 |
Real-Time Defensive Strategy Selection via Deep Reinforcement Learning A Charpentier, C Neal, N Boulahia-Cuppens, F Cuppens, R Yaich Proceedings of the 18th International Conference on Availability …, 2023 | | 2023 |
Intrusion Detection with Adversarial Attacks MA Merzouk, J Delas, C Neal, F Cuppens, N Boulahia-Cuppens, R Yaich | | 2022 |
Methods for Assessing the Cybersecurity Posture of Critical Infrastructure Via Testbed-Based Experimentation C Neal Ecole Polytechnique, Montreal (Canada), 2021 | | 2021 |
Analyzing the Resiliency of Microgrid Control Algorithms Against Malicious Input C Neal, R Al Mallah, JM Fernandez, A Lodi 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE …, 2020 | | 2020 |
A Comparison of Biology-based Metaheuristics for Finding Piecewise Linear Approximations of Digitized Soundcurves. C Neal, J Mohr International Conference on Genetic and Evolutionary Methods (GEM), 118-122, 2009 | | 2009 |