From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Asymptotic Behavior of Attack Graph Games., и . From Database to Cyber Security, том 11170 из Lecture Notes in Computer Science, стр. 104-112. Springer, (2018)Exploiting Adversary's Risk Profiles in Imperfect Information Security Games., и . GameSec, том 7037 из Lecture Notes in Computer Science, стр. 22-33. Springer, (2011)