Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach to Botnet Malware Detection Using Nonparametric Bayesian Methods., and . ARES, page 75:1-75:9. ACM, (2017)Informing Autonomous Deception Systems with Cyber Expert Performance Data., , , and . CoRR, (2021)Verification of the Change Blindness Phenomenon While Managing Critical Events on a Combat Information Display., , , and . Hum. Factors, 46 (2): 205-218 (2004)Watermark recovery from speech using inverse filtering and sign correlation., , , and . INTERSPEECH, page 1311-1314. ISCA, (2009)IoDDoS - The Internet of Distributed Denial of Sevice Attacks - A Case Study of the Mirai Malware and IoT-Based Botnets., , , , and . IoTBDS, page 47-58. SciTePress, (2017)Quantitative methods for ranking critical events., and . CogSIMA, page 118-121. IEEE, (2013)CAVA: Cognitive Aid for Vulnerability Analysis., , , , , , , , , and 7 other author(s). HICSS, page 7377-7386. ScholarSpace, (2024)No Time to Lie: Bounds on the Learning Rate of a Defender for Inferring Attacker Target Preferences., , , , , , and . GameSec, volume 13061 of Lecture Notes in Computer Science, page 138-157. Springer, (2021)Managing critical events: Designing an attention allocation system., and . CogSIMA, page 183-186. IEEE, (2012)Recovering asynchronous watermark tones from speech., , , and . ICASSP, page 1405-1408. IEEE, (2009)