Analyzing the perceived severity of cybersecurity threats reported on social media S Zong, A Ritter, G Mueller, E Wright arXiv preprint arXiv:1902.10680, 2019 | 52 | 2019 |
Causal discovery of cyber attack phases WG Mueller, A Memory, K Bartrem 2019 18th IEEE International Conference On Machine Learning And Applications …, 2019 | 7 | 2019 |
Sensor fusion and structured prediction for cyberattack event networks A Memory, WG Mueller 15th International Workshop on Mining and Learning with Graphs (MLG), 2019 | 3 | 2019 |
Forecasting Network Intrusions from Security Logs Using LSTMs WG Mueller, A Memory, K Bartrem MLHAT 1271 (Deployable Machine Learning for Security), 2020 | 2 | 2020 |
Detecting and Annotating Narratives in Social Media: A Vision Paper. M Blackburn, N Yu, A Memory, WG Mueller ICWSM Workshops, 2020 | 1 | 2020 |
Dynamic network formation with reinforcement learning WG Mueller | 1 | 2012 |
Essays on network formation WG Mueller Texas A&M University, 2012 | | 2012 |
Competing Allocation Rules in Networks WG Mueller | | 2011 |