Follow
Jaime Acosta
Jaime Acosta
U.S. Army Research Laboratory
No verified email
Title
Cited by
Cited by
Year
Achieving rapport with turn-by-turn, user-responsive emotional coloring
JC Acosta, NG Ward
Speech Communication 53 (9-10), 1137-1148, 2011
972011
Survey and taxonomy of adversarial reconnaissance techniques
S Roy, N Sharmin, JC Acosta, C Kiekintveld, A Laszka
ACM Computing Surveys 55 (6), 1-38, 2022
302022
Using emotion to gain rapport in a spoken dialog system
JC Acosta
252009
Responding to user emotional state by adding emotional coloring to utterances.
JC Acosta, NG Ward
INTERSPEECH, 1587-1590, 2009
202009
Cybersecurity deception experimentation system
JC Acosta, A Basak, C Kiekintveld, N Leslie, C Kamhoua
2020 IEEE Secure Development (SecDev), 34-40, 2020
152020
Lightweight on-demand honeypot deployment for cyber deception
JC Acosta, A Basak, C Kiekintveld, C Kamhoua
International Conference on Digital Forensics and Cyber Crime, 294-312, 2021
132021
A platform for evaluator-centric cybersecurity training and data acquisition
JC Acosta, J McKee, A Fielder, S Salamah
MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 394-399, 2017
122017
Augmenting attack graphs to represent data link and network layer vulnerabilities
JC Acosta, E Padilla, J Homer
MILCOM 2016-2016 IEEE Military Communications Conference, 1010-1015, 2016
122016
A framework for profiling multiprocessor memory performance
D Villa, J Acosta, PJ Teller, B Olszewski, T Morgan
Proceedings. Tenth International Conference on Parallel and Distributed …, 2004
82004
An efficient common substrings algorithm for on-the-fly behavior-based malware detection and analysis
JC Acosta, H Mendoza, BG Medina
MILCOM 2012-2012 IEEE Military Communications Conference, 1-6, 2012
72012
Survivability prediction of ad hoc networks under attack
JC Acosta, BG Medina
MILCOM 2012-2012 IEEE Military Communications Conference, 1-6, 2012
72012
Deep learning for cyber deception in wireless networks
FO Olowononi, AH Anwar, DB Rawat, JC Acosta, CA Kamhoua
2021 17th International Conference on Mobility, Sensing and Networking (MSN …, 2021
62021
Repeatable experimentation for cybersecurity moving target defense
JC Acosta, L Clarke, S Medina, M Akbar, M Shahriar Hossain, ...
Security and Privacy in Communication Networks: 17th EAI International …, 2021
52021
Cybersecurity Methodology for Specialized Behavior Analysis
E Padilla, JC Acosta, CD Kiekintveld
Digital Forensics and Cyber Crime: 11th EAI International Conference, ICDF2C …, 2021
52021
Software diversity for cyber deception
AB Sarr, AH Anwar, C Kamhoua, N Leslie, J Acosta
GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020
52020
Evaluating usability of permissioned blockchain for internet-of-battlefield things security
ED Buenrostro, AOG Rivera, D Tosh, JC Acosta, L Njilla
MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM), 841-846, 2019
52019
Network data curation toolkit: cybersecurity data collection, aided-labeling, and rule generation
JC Acosta, S Medina, J Ellis, L Clarke, V Rivas, A Newcomb
MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM), 849-854, 2021
42021
Achieving sensor identification and data flow integrity in critical cyber-physical infrastructures
AOG Rivera, DK Tosh, JC Acosta, L Njilla
2020 IEEE International Conference on Communications, Control, and Computing …, 2020
42020
A preliminary architecture for building communication software from traffic captures
JC Acosta, P Estrada Jr
Disruptive Technologies in Sensors and Sensor Systems 10206, 189-200, 2017
42017
Memory performance profiling via sampled performance monitor event traces
D Villa, J Acosta, P Teller, B Olszewski, T Morgan
Proceedings of the 5th Annual IBM Austin Center for Advanced Studies Conference, 2004
42004
The system can't perform the operation now. Try again later.
Articles 1–20