Adam Dalton
Title
Cited by
Cited by
Year
Automatic metaphor detection using large-scale lexical resources and conventional metaphor extraction
Y Wilks, A Dalton, J Allen, L Galescu
Proceedings of the First Workshop on Metaphor in NLP, 36-44, 2013
402013
A new dataset and evaluation for belief/factuality
V Prabhakaran, T By, J Hirschberg, O Rambow, S Shaikh, T Strzalkowski, ...
Proceedings of the Fourth Joint Conference on Lexical and Computational …, 2015
162015
A distributed simulation approach for modeling and analyzing systems of systems
A Sharawi, SN Sala-Diakanda, A Dalton, S Quijada, N Yousef, L Rabelo, ...
Proceedings of the 2006 Winter Simulation Conference, 1028-1035, 2006
152006
MTC2: A command and control framework for moving target defense and cyber resilience
M Carvalho, TC Eskridge, L Bunch, A Dalton, R Hoffman, JM Bradshaw, ...
2013 6th International Symposium on Resilient Control Systems (ISRCS), 175-180, 2013
112013
Improving cyber-attack predictions through information foraging
A Dalton, B Dorr, L Liang, K Hollingshead
2017 IEEE International Conference on Big Data (Big Data), 4642-4647, 2017
82017
A human-agent teamwork command and control framework for moving target defense (mtc2)
MM Carvalho, TC Eskridge, L Bunch, JM Bradshaw, A Dalton, P Feltovich, ...
Proceedings of the Eighth Annual Cyber Security and Information Intelligence …, 2013
82013
The Columbia-GWU System at the 2016 TAC KBP BeSt Evaluation.
O Rambow, T Yu, A Radeva, AR Fabbri, C Hidey, T Peng, KR McKeown, ...
TAC, 2016
62016
The panacea threat intelligence and active defense platform
A Dalton, E Aghaei, E Al-Shaer, A Bhatia, E Castillo, Z Cheng, ...
arXiv preprint arXiv:2004.09662, 2020
42020
Detecting asks in social engineering attacks: Impact of linguistic and structural knowledge
B Dorr, A Bhatia, A Dalton, B Mather, B Hebenstreit, S Santhanam, ...
Proceedings of the AAAI Conference on Artificial Intelligence 34 (05), 7675-7682, 2020
42020
Improving DISCERN with Deep Learning.
G Dubbin, A Bhatia, BJ Dorr, A Dalton, K Hollingshead, S Kandaswamy, ...
TAC, 2016
42016
Earliest memories of pets predict adult attitudes: Phenomenological, structural, and textual analyses
PH Marshall, ME Ireland, AA Dalton
Human–Animal Interaction Bulletin 3 (1), 28-51, 2015
42015
Discovering and characterizing emerging events in big data (DISCERN)
BJ Dorr, M Petrovic, JF Allen, CM Teng, A Dalton
Proceedings of the AAAI Fall Symposium Natural Language Access to Big Data, 2014
32014
Learning to plan and realize separately for open-ended dialogue systems
S Santhanam, Z Cheng, B Mather, B Dorr, A Bhatia, B Hebenstreit, ...
arXiv preprint arXiv:2009.12506, 2020
22020
Active defense against social engineering: The case for human language technology
A Dalton, E Aghaei, E Al-Shaer, A Bhatia, E Castillo, Z Cheng, ...
Proceedings for the First International Workshop on Social Threats in Online …, 2020
22020
Target-focused Sentiment and Belief Extraction and Classification using CUBISM.
A Dalton, M Wixted, Y Wilks, M Alagesan, GA Katsios, A Subburathinam, ...
TAC, 2016
22016
Discovering and characterizing emerging events in big data
BJ Dorr, M Petrovic, JF Allen, CM Teng, A Dalton
2014 AAAI Fall Symposium Series, 2014
22014
Influence and Belief in Congressional Hearings
M Clark, A Dalton, T By, Y Wilks, S Shaikh, CS Lin, T Strzalkowski
NLP Unshared Task in PoliInformatics. URL: http://www. academia. edu …, 2014
22014
Email Threat Detection Using Distinct Neural Network Approaches
E Castillo, S Dhaduvai, P Liu, KS Thakur, A Dalton, T Strzalkowski
Proceedings for the First International Workshop on Social Threats in Online …, 2020
12020
Adaptation of a lexical organization for social engineering detection and response generation
A Bhatia, A Dalton, B Mather, S Santhanam, S Shaikh, A Zemel, ...
arXiv preprint arXiv:2004.09050, 2020
12020
Does Outrage Signal Cyber Attacks? Predicting" Bad Behavior" from Sentiment in Online Content
K Hollingshead, BJ Dorr, A Dalton, M Barton
The Thirty-Second International Flairs Conference, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20