Skip to main content
Back to KTH start page

Publications by Kim Hammar

Peer reviewed

Articles

[1]
K. Hammar et al., "Adaptive Security Response Strategies Through Conjectural Online Learning," IEEE Transactions on Information Forensics and Security, vol. 20, pp. 4055-4070, 2025.
[2]
K. Hammar and R. Stadler, "Learning Near-Optimal Intrusion Responses Against Dynamic Attackers," IEEE Transactions on Network and Service Management, vol. 21, no. 1, pp. 1158-1177, 2024.
[3]
K. Hammar and R. Stadler, "Intrusion Prevention Through Optimal Stopping," IEEE Transactions on Network and Service Management, vol. 19, no. 3, pp. 2333-2348, 2022.
[4]
K. Hammar et al., "Deep text classification of Instagram data using word embeddings and weak supervision," WEB INTELLIGENCE, vol. 18, no. 1, pp. 53-67, 2020.

Conference papers

[5]
K. Hammar and R. Stadler, "Intrusion Tolerance as a Two-Level Game," in Decision and Game Theory for Security - 15th International Conference, GameSec 2024, Proceedings, 2025, pp. 3-23.
[6]
K. Hammar and T. Li, "Online Incident Response Planning under Model Misspecification through Bayesian Learning and Belief Quantization," in Proceedings of the 18th ACM Workshop on Artificial Intelligence and Security, AISec 2025, 2025, pp. 40-51.
[7]
T. Li et al., "Conjectural Online Learning with First-order Beliefs in Asymmetric Information Stochastic Games," in 2024 IEEE 63rd Conference on Decision and Control, CDC 2024, 2024, pp. 6780-6785.
[8]
K. Hammar and R. Stadler, "Intrusion tolerance for networked systems through two-level feedback control," in Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024, 2024, pp. 338-352.
[9]
F. Shahabsamani, K. Hammar and R. Stadler, "Online Policy Adaptation for Networked Systems using Rollout," in IEEE/IFIP Network Operations and Management Symposium 6–10 May 2024, Seoul, South Korea, 2024.
[10]
F. S. Samani, K. Hammar and R. Stadler, "Online Policy Adaptation for Networked Systems using Rollout," in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024.
[11]
F. S. Samani, K. Hammar and R. Stadler, "Demonstrating a System for Dynamically Meeting Management Objectives on a Service Mesh," in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023, 2023.
[12]
K. Hammar and R. Stadler, "Digital Twins for Security Automation," in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023, 2023.
[13]
K. Hammar and R. Stadler, "Scalable Learning of Intrusion Response Through Recursive Decomposition," in Decision and Game Theory for Security - 14th International Conference, GameSec 2023, Proceedings, 2023, pp. 172-192.
[14]
K. Hammar and R. Stadler, "A System for Interactive Examination of Learned Security Policies," in Proceedings of the IEEE/IFIP Network Operations and Management Symposium 2022 : Network and Service Management in the Era of Cloudification, Softwarization and Artificial Intelligence, NOMS 2022, 2022.
[15]
K. Hammar and R. Stadler, "An Online Framework for Adapting Security Policies in Dynamic IT Environments," in 2022 18Th International Conference On Network And Service Management (CNSM 2022) : INTELLIGENT MANAGEMENT OF DISRUPTIVE NETWORK TECHNOLOGIES AND SERVICES, 2022.
[16]
K. Hammar and R. Stadler, "Learning Intrusion Prevention Policies through Optimal Stopping," in Proceedings Of The 2021 17Th International Conference On Network And Service Management (CNSM 2021) : Smart Management For Future Networks And Services, 2021, pp. 509-517.
[17]
K. Hammar and R. Stadler, "Finding Effective Security Strategies through Reinforcement Learning and Self-Play," in 2020 16th international conference on network and service management (CNSM), 2020.
[18]
S. Jaradat et al., "TALS : A framework for text analysis, fine-grained annotation, localisation and semantic segmentation," in Proceedings - International Computer Software and Applications Conference, 2019, pp. 201-206.
[19]
K. Hammar et al., "Deep Text Mining of Instagram Data Without Strong Supervision," in Proceedings - 2018 IEEE/WIC/ACM International Conference on Web Intelligence, WI 2018, 2018, pp. 158-165.
[20]
S. Jaradat et al., "Dynamic CNN Models For Fashion Recommendation in Instagram," in 2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS, 2018, pp. 1144-1151.

Non-peer reviewed

Theses

[21]
K. Hammar, "Optimal Security Response to Network Intrusions in IT Systems," Doctoral thesis Stockholm : Kungliga Tekniska högskolan, TRITA-EECS-AVL, 2024:85, 2024.
Latest sync with DiVA:
2026-02-04 23:20:30 UTC