Follow
Kimberly Ferguson-Walter
Kimberly Ferguson-Walter
Department of Defense
Verified email at spawar.navy.mil
Title
Cited by
Cited by
Year
Repairing disengagement with non-invasive interventions
I Arroyo, K Ferguson, J Johns, T Dragon, H Meheranian, D Fisher, A Barto, ...
AIED 2007, 195-202, 2007
1622007
Repairing disengagement with non-invasive interventions
I Arroyo, K Ferguson, J Johns, T Dragon, H Meheranian, D Fisher, A Barto, ...
AIED 2007, 195-202, 2007
1622007
Proto-transfer learning in markov decision processes using spectral methods
K Ferguson, S Mahadevan
Computer Science Department Faculty Publication Series, 151, 2006
552006
Friend or Faux Deception for Cyber Defense
KJ Ferguson-Walter, DS LaFon, TB Shade
Journal of Information Warfare 16 (2), 28-42, 2017
462017
Game theory for adaptive defensive cyber deception
K Ferguson-Walter, S Fugate, J Mauger, M Major
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of …, 2019
422019
Improving intelligent tutoring systems: Using expectation maximization to learn student skill levels
K Ferguson, I Arroyo, S Mahadevan, B Woolf, A Barto
Intelligent Tutoring Systems: 8th International Conference, ITS 2006 …, 2006
422006
Improving intelligent tutoring systems: Using expectation maximization to learn student skill levels
K Ferguson, I Arroyo, S Mahadevan, B Woolf, A Barto
Intelligent Tutoring Systems: 8th International Conference, ITS 2006 …, 2006
422006
The Tularosa Study: An Experimental Design and Implementation to Quantify the Effectiveness of Cyber Deception
K Ferguson-Walter, T Shade, A Rogers, E Niedbala, M Trumbo, K Nauer, ...
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
412019
Examining the efficacy of decoy-based and psychological cyber deception
KJ Ferguson-Walter, MM Major, CK Johnson, DH Muhleman
30th USENIX security symposium (USENIX Security 21), 1127-1144, 2021
362021
“Oh, Look, A Butterfly!” a framework for distracting attackers to improve cyber defense
R Gutzwiller, K Ferguson-Walter, S Fugate, A Rogers
Proceedings of the Human Factors and Ergonomics Society Annual Meeting 62 (1 …, 2018
362018
Learning representation and control in continuous Markov decision processes
S Mahadevan, M Maggioni, K Ferguson, S Osentoski
AAAI 6, 1194-1199, 2006
362006
Artificial intelligence and game theory models for defending critical networks with cyber deception
S Fugate, K Ferguson-Walter
AI Magazine 40 (1), 49-62, 2019
272019
Incorporating deception into cyberbattlesim for autonomous defense
E Walter, K Ferguson-Walter, A Ridley
arXiv preprint arXiv:2108.13980, 2021
262021
The Moonraker Study: An Experimental Evaluation of Host-Based Deception.
T Shade, A Rogers, K Ferguson-Walter, SB Elsen, D Fayette, ...
HICSS, 1-10, 2020
202020
You only Lie Twice: A Multi-round Cyber Deception Game of Questionable Veracity
M Bilinski, K Ferguson-Walter, S Fugate, R Gabrys, J Mauger, B Souza
Decision and Game Theory for Security: 10th International Conference …, 2019
182019
You only lie twice: A multi-round cyber deception game of questionable veracity
M Bilinski, K Ferguson-Walter, S Fugate, R Gabrys, J Mauger, B Souza
International Conference on Decision and Game Theory for Security, 65-84, 2019
182019
An empirical assessment of the effectiveness of deception for cyber defense
KJ Ferguson-Walter
172020
The world (of CTF) is not enough data: Lessons learned from a cyber deception experiment
K Ferguson-Walter, M Major, D Van Bruggen, S Fugate, R Gutzwiller
2019 IEEE 5th International Conference on Collaboration and Internet …, 2019
172019
Decision-making biases and cyber attackers
CK Johnson, RS Gutzwiller, J Gervais, KJ Ferguson-Walter
2021 36th IEEE/ACM International Conference on Automated Software …, 2021
142021
Are cyber attackers thinking fast and slow? Exploratory analysis reveals evidence of decision-making biases in red teamers
RS Gutzwiller, KJ Ferguson-Walter, SJ Fugate
Proceedings of the Human Factors and Ergonomics Society Annual Meeting 63 (1 …, 2019
142019
The system can't perform the operation now. Try again later.
Articles 1–20