Author of the publication

Disclose or Exploit? A Game-Theoretic Approach to Strategic Decision Making in Cyber-Warfare.

, , , , , and . IEEE Syst. J., 14 (3): 3779-3790 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IMPACT: A System for Building Agent Applications., , and . J. Intell. Inf. Syst., 14 (2-3): 95-113 (2000)Generalized Closed World Assumptions is Pi^0_2-Complete., and . Inf. Process. Lett., 34 (6): 289-291 (1990)Finite Graph Algebras for Querying Interactive Multimedia Presentation Databases., , , and . Multimedia Information Systems, page 20-27. (1999)Annotated RDF, , and . ESWC 2006, volume 4011 of LNCS, page 487--501. Budva, Montenegro, SpringerlVerlang, (2006)A Semantical Framework for Supporting Subjective and Conditional Probabilities in Deductive Databases., and . ICLP, page 565-580. MIT Press, (1991)COMPUTER SCIENCE: Cultural Modeling in Real Time. Science, 317 (5844): 1509--1510 (September 2007)Combining Default Logic Databases., , , and . Int. J. Cooperative Inf. Syst., 3 (3): 319-348 (1994)Reasoning in Paraconsistent Logics., , , and . Automated Reasoning: Essays in Honor of Woody Bledsoe, page 181-210. Kluwer Academic Publishers, (1991)Foundations of Secure Deductive Databases., , and . IEEE Trans. Knowl. Data Eng., 7 (3): 406-422 (1995)Sync Classes: A Framework for Optimal Scheduling of Requests in Multimedia Storage Servers., , , and . IEEE Trans. Knowl. Data Eng., 12 (1): 60-77 (2000)