From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Game theoretic modeling of cyber deception in the Internet of Battlefield Things.. Allerton, стр. 862. IEEE, (2018)Multi-level VM replication based survivability for mission-critical cloud computing., , , и . IM, стр. 1351-1356. IEEE, (2015)A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory., , , и . MWSCAS, стр. 853-856. IEEE, (2018)Decision Theory-Guided Deep Reinforcement Learning for Fast Learning., , , , , и . CoRR, (2024)Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables., , , , и . J. Netw. Comput. Appl., (2022)Secure-by-synthesis network with active deception and temporal logic specifications., , , , и . CoRR, (2020)Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement., , , , и . IEEE Access, (2021)Game-Theoretic Modeling of Cyber Deception Against Epidemic Botnets in Internet of Things., , , и . IEEE Internet Things J., 9 (4): 2678-2687 (2022)Rethinking Information Sharing for Actionable Threat Intelligence., , , , и . CoRR, (2017)Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence., , , , и . CoRR, (2017)