Publications by Kim Hammar
Peer reviewed
Articles
[1]
K. Hammar and R. Stadler, "Learning Near-Optimal Intrusion Responses Against Dynamic Attackers," IEEE Transactions on Network and Service Management, vol. 21, no. 1, pp. 1158-1177, 2024.
[2]
K. Hammar and R. Stadler, "Intrusion Prevention Through Optimal Stopping," IEEE Transactions on Network and Service Management, vol. 19, no. 3, pp. 2333-2348, 2022.
[3]
K. Hammar et al., "Deep text classification of Instagram data using word embeddings and weak supervision," WEB INTELLIGENCE, vol. 18, no. 1, pp. 53-67, 2020.
Conference papers
[4]
K. Hammar and R. Stadler, "Intrusion Tolerance as a Two-Level Game," in Decision and Game Theory for Security - 15th International Conference, GameSec 2024, Proceedings, 2025, pp. 3-23.
[5]
K. Hammar and R. Stadler, "Intrusion tolerance for networked systems through two-level feedback control," in Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024, 2024, pp. 338-352.
[6]
F. Shahabsamani, K. Hammar and R. Stadler, "Online Policy Adaptation for Networked Systems using Rollout," in IEEE/IFIP Network Operations and Management Symposium 6–10 May 2024, Seoul, South Korea, 2024.
[7]
F. S. Samani, K. Hammar and R. Stadler, "Online Policy Adaptation for Networked Systems using Rollout," in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024.
[8]
F. S. Samani, K. Hammar and R. Stadler, "Demonstrating a System for Dynamically Meeting Management Objectives on a Service Mesh," in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023, 2023.
[9]
K. Hammar and R. Stadler, "Digital Twins for Security Automation," in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023, 2023.
[10]
K. Hammar and R. Stadler, "Scalable Learning of Intrusion Response Through Recursive Decomposition," in Decision and Game Theory for Security - 14th International Conference, GameSec 2023, Proceedings, 2023, pp. 172-192.
[11]
K. Hammar and R. Stadler, "A System for Interactive Examination of Learned Security Policies," in Proceedings of the IEEE/IFIP Network Operations and Management Symposium 2022 : Network and Service Management in the Era of Cloudification, Softwarization and Artificial Intelligence, NOMS 2022, 2022.
[12]
K. Hammar and R. Stadler, "An Online Framework for Adapting Security Policies in Dynamic IT Environments," in 2022 18Th International Conference On Network And Service Management (CNSM 2022) : INTELLIGENT MANAGEMENT OF DISRUPTIVE NETWORK TECHNOLOGIES AND SERVICES, 2022.
[13]
K. Hammar and R. Stadler, "Learning Intrusion Prevention Policies through Optimal Stopping," in Proceedings Of The 2021 17Th International Conference On Network And Service Management (CNSM 2021) : Smart Management For Future Networks And Services, 2021, pp. 509-517.
[14]
K. Hammar and R. Stadler, "Finding Effective Security Strategies through Reinforcement Learning and Self-Play," in 2020 16th international conference on network and service management (CNSM), 2020.
[15]
S. Jaradat et al., "TALS : A framework for text analysis, fine-grained annotation, localisation and semantic segmentation," in Proceedings - International Computer Software and Applications Conference, 2019, pp. 201-206.
[16]
K. Hammar et al., "Deep Text Mining of Instagram Data Without Strong Supervision," in Proceedings - 2018 IEEE/WIC/ACM International Conference on Web Intelligence, WI 2018, 2018, pp. 158-165.
[17]
S. Jaradat et al., "Dynamic CNN Models For Fashion Recommendation in Instagram," in 2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS, 2018, pp. 1144-1151.
Non-peer reviewed
Theses
[18]
K. Hammar, "Optimal Security Response to Network Intrusions in IT Systems," Doctoral thesis Stockholm : Kungliga Tekniska högskolan, TRITA-EECS-AVL, 2024:85, 2024.
Other
[19]
K. Hammar et al., "Automated Security Response through Online Learning with Adaptive Conjectures," (Manuscript).
[20]
K. Hammar, R. Stadler and N. Dhir, "Optimal Defender Strategies for CAGE-2 using Causal Modeling and Tree Search," (Manuscript).
Latest sync with DiVA:
2024-11-19 00:22:30