Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gini index based initial coin offering mechanism., , and . Auton. Agents Multi Agent Syst., 36 (1): 7 (2022)Revenue Maximizing Markets for Zero-Day Exploits., , and . CoRR, (2020)Evolving Reinforcement Learning Environment to Minimize Learner's Achievable Reward: An Application on Hardening Active Directory Systems., , , , and . GECCO, page 1348-1356. ACM, (2023)Mechanism Design for Public Projects via Neural Networks., , , , and . CoRR, (2020)Catch Me if You Can: Effective Honeypot Placement in Dynamic AD Attack Graphs., , and . CoRR, (2023)Discovering Top-k Structural Hole Spanners in Dynamic Networks., , , and . CoRR, (2023)Modelling Irrational Behaviour of Residential End Users using Non-Stationary Gaussian Processes., , , , , , and . CoRR, (2023)A Scalable Double Oracle Algorithm for Hardening Large Active Directory Systems., , , and . AsiaCCS, page 993-1003. ACM, (2023)Scalable Edge Blocking Algorithms for Defending Active Directory Style Attack Graphs., , , , and . AAAI, page 5649-5656. AAAI Press, (2023)Optimal sizing and scheduling of community battery storage within a local market., , , , , , and . e-Energy, page 34-46. ACM, (2022)