Finding effective security strategies through reinforcement learning and self-play K Hammar, R Stadler 2020 16th International Conference on Network and Service Management (CNSM), 1-9, 2020 | 70 | 2020 |
Deep Text Mining of Instagram Data Without Strong Supervision K Hammar KTH Royal Institute of Technology, 2018 | 36 | 2018 |
Learning intrusion prevention policies through optimal stopping K Hammar, R Stadler 2021 17th International Conference on Network and Service Management (CNSM …, 2021 | 29 | 2021 |
Intrusion Prevention through Optimal Stopping K Hammar, R Stadler IEEE Transactions on Network and Service Management 2022, 2021 | 22 | 2021 |
Horizontally scalable ml pipelines with a feature store A Ormenisan, M Ismail, K Hammar, R Andersson, E Gebremeskel, ... Proceedings of the 2nd SysML Conference, Palo Alto, CA, USA 31, 2019 | 19* | 2019 |
Digital twins for security automation K Hammar, R Stadler NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium, 1-6, 2023 | 15 | 2023 |
Learning near-optimal intrusion responses against dynamic attackers K Hammar, R Stadler IEEE Transactions on Network and Service Management 2023, 2023 | 12 | 2023 |
Learning Security Strategies through Game Play and Optimal Stopping K Hammar, R Stadler International Conference on Machine Learning (ICML) Ml4Cyber Workshop 2022 …, 2022 | 12 | 2022 |
An online framework for adapting security policies in dynamic it environments K Hammar, R Stadler 2022 18th International Conference on Network and Service Management (CNSM …, 2022 | 8 | 2022 |
Dynamic CNN models for fashion recommendation in Instagram S Jaradat, N Dokoohaki, K Hammar, U Wara, M Matskin 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018 | 8 | 2018 |
Conjectural online learning with first-order beliefs in asymmetric information stochastic games T Li, K Hammar, R Stadler, Q Zhu arXiv preprint arXiv:2402.18781, 2024 | 6 | 2024 |
Scalable Learning of Intrusion Responses through Recursive Decomposition K Hammar, R Stadler 2023 International Conference on Decision and Game Theory for Security, 2023 | 6 | 2023 |
A System for Interactive Examination of Learned Security Policies K Hammar, R Stadler NOMS 2022 IEEE, 2022 | 6 | 2022 |
Feature store: The missing data layer in ML pipelines K Hammar, J Dowling URL: https://www. logicalclocks. com/feature-store, 2018 | 6 | 2018 |
Demonstrating a System for Dynamically Meeting Management Objectives on a Service Mesh FS Samani, K Hammar, R Stadler NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium, 1-3, 2023 | 5 | 2023 |
Automated Security Response through Online Learning with Adaptive Conjectures K Hammar, T Li, R Stadler, Q Zhu arXiv preprint arXiv:2402.12499, 2024 | 4 | 2024 |
Deep text classification of Instagram data using word embeddings and weak supervision K Hammar, S Jaradat, N Dokoohaki, M Matskin Web Intelligence 18 (1), 53-67, 2020 | 4 | 2020 |
Optimal Defender Strategies for CAGE-2 using Causal Modeling and Tree Search K Hammar, N Dhir, R Stadler arXiv preprint arXiv:2407.11070, 2024 | 3 | 2024 |
Intrusion Tolerance for Networked Systems through Two-Level Feedback Control K Hammar, R Stadler IEEE/IFIP Dependable Systems and Networks Conference (DSN'24), 2024 | 3 | 2024 |
TALS: a framework for text analysis, fine-grained annotation, localisation and semantic segmentation S Jaradat, N Dokoohaki, U Wara, M Goswami, K Hammar, M Matskin 2019 IEEE 43rd annual computer software and applications conference (COMPSAC …, 2019 | 3 | 2019 |