[ (*) = undergraduate student co-author; (+) = graduate student co-author ]
Dobson, G., Rege, A. & Carley, K. (forthcoming). Virtual Cyber Warfare Experiments based on Empirically Observed Adversarial Intrusion Chain Behavior. Proceedings from the 13th International Conference on Cyber Warfare and Security.
Rege, A., Obradovic, Z., Asadi, N.(+), Parker, E.(+), Pandit, R.(*), Masceri, N.(*), Singer, B.(*) (2018) “Predicting Adversarial Cyber Intrusion Stages Using Autoregressive Neural Networks,” <u>IEEE Intelligent Systems PP(99):1-1.</u> Impact Factor 2.374.
Yang, S. J., Rege, A. & Kuhl, M. E. (2017). “Learning, Simulating and Predicting Adversary Attack Behaviors for Proactive Cyber Defense“, in Proceedings of NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defence and Resilience, pp. 30-34, October 18-20, 2017, Prague, Czech Republic.
Rege, A., Biswas, S., Bai, L., Parker, E. (+) & McJunkin, T. (2017). “Using Simulators to Assess Knowledge and Behavior of “Novice” Operators of Critical Infrastructure under Cyberattack Events”. In Resilience Week (RWS), 2017 (pp. 50-56). IEEE.
Rege, A., Parker, E. (+) & McJunkin, T. (2017). “Using a Critical Infrastructure Game to Provide Realistic Observation of the Human in the Loop by Criminal Justice Students”. In Resilience Week (RWS), 2017 (pp. 154-160). IEEE.
Rege, A., Adams, J., Parker, E. (+), Singer, B. (*), Masceri, N. (*) & Pandit, R. (*) (2017). “Using Cyber-security Exercises to Study Adversarial Intrusion Chains, Decision-Making, and Group Dynamics”. In ECCWS 2017 16th European Conference on Cyber Warfare and Security (p. 351). Academic Conferences and publishing limited.
Rege, A., Obradovic, Z., Asadi, N.(+), Singer, B.(*), Masceri, N.(*), Heath, Q.(*). (2017). “A Temporal Assessment of Cyber Intrusion Chains Using Multidisciplinary Frameworks and Methodologies,” Proc. Int’l Conf. Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017), London, UK, June 2017.
Rege, A., Obradovic, Z., Asadi, N.(+), Parker, E.(+), Masceri, N.(*), Singer, B(*), Pandit, R(*). (2017). “Using a Real-Time Cybersecurity Exercise Case Study to Understand Temporal Characteristics of Cyberattacks,” Proc. 2017 Int’l Conf. Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior representation in Modeling and Simulation (SBP-BRiMS), Washington DC, July 2017.
Rege, A., Parker, E. (+), Singer, B.(*) & Masceri, N(*). (2017). A Qualitative Exploration of Adversarial Adaptability, Group Dynamics, and Cyber Intrusion Chains. <u>Journal of Information Warfare</u>. 16(3): 1-16.
Rege, A., Singer, B. (*), Masceri, N. (*) & Heath, Q. (*) (2017). Measuring Cyber Intrusion Chains, Adaptive Adversarial Behavior, and Group Dynamics. Proceedings of the 12th International Conference on Cyber Warfare and Security.
Rege, A. (2016). Incorporating the Human Element in Anticipatory and Dynamic Cyber Defense. Proceedings of the 4th International Conference on Cybercrime and Computer Forensics (ICCCF). Institute of Electrical and Electronics Engineers (IEEE).
McJunkin, T., Rieger, C., Rege, A., Biswas, S., Haney, M., Santora, M., Johnson, B., Boring, R., Naidu, D.S. & Gardner, J. (2016). Multidisciplinary Game Based Approach for Generating Student Enthusiasm in Addressing Critical Infrastructure Challenges. Proceedings of the 123rd American Society for Engineering Education (ASEE).
Rege, A. (2015). Multidisciplinary Experiential Learning for Holistic Cybersecurity Education, Research and Evaluation. Proceedings of the 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education.
Rege, A., Ferrese, F., Biswas, S., & Bai, L. (2014). Adversary dynamics and smart grid security: A multiagent system approach. Proceedings of the 7th International Symposium on Resilient Control Systems (ISRCS). Institute of Electrical and Electronics Engineers (IEEE). pp. 1-7. IEEE Catalog Number: CFP1469H-ART [ISBN: 978-1-4799-4187-2] DOI: 10.1109/ISRCS.2014.6900101.
Rege, A. (2014). A Criminological Perspective on Power Grid Cyberattacks: Using Routine Activities Theory and Rational Choice Perspective to Explore Adversarial Decision-Making. Journal of Homeland Security and Emergency Management (JHSEM). 11(4): 463-487. Impact Factor 0.566
Rege, A. (2014). Digital Information Warfare Trends in Eurasia. Security Journal, 27(2): 374-398. Impact factor 0.341
var scJsHost = ((“https:” == document.location.protocol) ?
“https://secure.” : “http://www.”);