default search action
Brett Benyo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c23]Shou Matsumoto, Alexandre Barreto, Paulo C. G. Costa, Brett Benyo, Michael Atighetchi, Daniel Javorsek:
Dynamic Explanation of Bayesian Networks with Abductive Bayes Factor Qualitative Propagation and Entropy-Based Qualitative Explanation. FUSION 2021: 1-9 - 2020
- [c22]Joud Khoury, Tim Upthegrove, Armando Caro, Brett Benyo, Derrick Kong:
An Event-based Data Model for Granular Information Flow Tracking. TaPP 2020
2010 – 2019
- 2019
- [c21]Sarah Jeter, Colleen T. Rock, Brett Benyo, Aaron Adler, Fusun Yaman, Michael J. Beckerle, Alice M. Mulvehill, Robert Hoh:
Semantic Links Across Distributed Heterogeneous Data. DCAI 2019: 107-115 - 2018
- [c20]Brett Benyo, Shane S. Clark, Aaron Paulos, Partha P. Pal:
HYDRA: Hypothesis Driven Repair Automation. ARES 2018: 8:1-8:10 - 2015
- [c19]Shane S. Clark, Aaron Paulos, Brett Benyo, Partha P. Pal, Richard E. Schantz:
Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks. ARES 2015: 80-89 - 2014
- [j3]Partha P. Pal, Richard E. Schantz, Aaron Paulos, Brett Benyo:
Managed Execution Environment as a Moving-Target Defense Infrastructure. IEEE Secur. Priv. 12(2): 51-59 (2014) - 2013
- [j2]Jacob Beal, Kyle Usbeck, Brett Benyo:
On the Evaluation of Space-Time Functions. Comput. J. 56(12): 1500-1517 (2013) - [c18]Aaron Paulos, Partha P. Pal, Richard E. Schantz, Brett Benyo, David Johnson, Mike Hibler, Eric Eide:
Isolation of Malicious External Inputs in a Security Focused Adaptive Execution Environment. ARES 2013: 82-91 - [c17]Fusun Yaman, Brett Benyo, Alice M. Mulvehill:
Temporal Milestones in HTNs. AAAI 2013: 1005-1011 - [c16]Aaron Paulos, Partha P. Pal, Richard E. Schantz, Brett Benyo:
Moving target defense (MTD) in an adaptive execution environment. CSIIRW 2013: 62 - [c15]Alice M. Mulvehill, Brett Benyo, Fusun Yaman:
Leveraging Historical Experience to Evaluate and Adapt Courses of Action. ICCBR 2013: 241-254 - [c14]Carl Andersen, Brett Benyo, Miguel Calejo, Mike Dean, Paul Fodor, Benjamin N. Grosof, Michael Kifer, Senlin Liang, Terrance Swift:
Advanced Knowledge Base Debugging for Rulelog. RuleML (2) 2013 - [c13]Brett Benyo, Partha P. Pal, Richard E. Schantz, Aaron Paulos, David J. Musliner, Tom Marble, Jeffrey M. Rye, Michael Boldt, Scott E. Friedman:
Automated Self-Adaptation for Cyber-Defense - Pushing Adaptive Perimeter Protection Inward. SASO Workshops 2013: 47-52 - [i1]Carl Andersen, Brett Benyo, Miguel Calejo, Mike Dean, Paul Fodor, Benjamin N. Grosof, Michael Kifer, Senlin Liang, Terrance Swift:
Understanding Rulelog Computations in Silk. CoRR abs/1308.4125 (2013) - 2012
- [c12]Partha P. Pal, Richard E. Schantz, Aaron Paulos, Brett Benyo, David Johnson, Mike Hibler, Eric Eide:
A3: An Environment for Self-Adaptive Diagnosis and Immunization of Novel Attacks. SASO Workshops 2012: 15-22 - 2011
- [j1]Michael Atighetchi, Brett Benyo, Abhimanyu Gosain, Robert MacIntyre, Partha P. Pal, Virginia Travers, John A. Zinky:
Transparent Insertion of Custom Logic in HTTP(S) Streams Using PbProxy. IEEE Internet Comput. 15(3): 43-50 (2011) - 2010
- [c11]Benjamin N. Grosof, Mark H. Burstein, Mike Dean, Carl Andersen, Brett Benyo, William Ferguson, Daniela Inclezan, Richard Shapiro:
A SILK Graphical UI for Defeasible Reasoning, with a Biology Causal Process Example. RuleML Challenge 2010 - [c10]Benjamin N. Grosof, Mark H. Burstein, Mike Dean, Carl Andersen, Brett Benyo, William Ferguson, Daniela Inclezan, Richard Shapiro:
A SILK Graphical UI for Defeasible Reasoning, with a Biology Causal Process Example. ISWC (Posters & Demos) 2010
2000 – 2009
- 2008
- [c9]Mark H. Burstein, Robert Laddaga, David D. McDonald, Michael T. Cox, Brett Benyo, Paul Robertson, Talib S. Hussain, Marshall Brinn, Drew V. McDermott:
POIROT - Integrated Learning of Web Service Procedures. AAAI 2008: 1274-1279 - 2007
- [c8]Alice M. Mulvehill, Brett Benyo, Michael T. Cox, Renu Kurien Bostwick:
Expectation Failure as a Basis for Agent-Based Model Diagnosis and Mixed Initiative Model Adaptation during Anomalous Plan Execution. IJCAI 2007: 489-494 - 2003
- [c7]Jeffrey M. Bradshaw, Andrzej Uszok, Renia Jeffers, Niranjan Suri, Patrick J. Hayes, Mark H. Burstein, Alessandro Acquisti, Brett Benyo, Maggie R. Breedy, Marco M. Carvalho, David J. Diller, Matt Johnson, Shriniwas Kulkarni, James Lott, Maarten Sierhuis, Ron van Hoof:
Representation and reasoning for DAML-based policy and domain services in KAoS and nomads. AAMAS 2003: 835-842 - [c6]Niranjan Suri, Jeffrey M. Bradshaw, Andrzej Uszok, Maggie R. Breedy, Marco M. Carvalho, Paul Groth, Renia Jeffers, Matt Johnson, Shriniwas Kulkarni, James Lott, Mark H. Burstein, Brett Benyo, David J. Diller:
Toward DAML-based policy enforcement for semantic data transformation and filtering in multi-agent systems. AAMAS 2003: 1132-1133 - [c5]Niranjan Suri, Jeffrey M. Bradshaw, Mark H. Burstein, Andrzej Uszok, Brett Benyo, Maggie R. Breedy, Marco M. Carvalho, David J. Diller, Renia Jeffers, Matt Johnson, Shriniwas Kulkarni, James Lott:
DAML-Based Policy Enforcement for Semantic Data Transformation and Filtering in Multi-agent Systems. CEEMAS 2003: 122-135 - 2001
- [c4]Bryan Horling, Brett Benyo, Victor R. Lesser:
Using self-diagnosis to adapt organizational structures. Agents 2001: 529-536 - 2000
- [c3]Thomas Wagner, Brett Benyo, Victor R. Lesser, Ping Xuan:
Investigating Interactions between Agent Conversations and Agent Control Components. Issues in Agent Communication 2000: 314-330 - [c2]Bryan Horling, Brett Benyo, Victor R. Lesser:
Using Self-Diagnosis to Adapt Organizational Structures. ICMAS 2000: 397-398
1990 – 1999
- 1999
- [c1]Victor R. Lesser, Michael Atighetchi, Brett Benyo, Bryan Horling, Anita Raja, Régis Vincent, Thomas Wagner, Ping Xuan, Xiaoqin Zhang:
The UMASS Intelligent Home Project. Agents 1999: 291-298
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint