Author of the publication

Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance.

, , , , , and . Adaptive Autonomous Secure Cyber Systems, Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Electric Elves: Applying Agent Technology to Support Human Organizations., , , , , , , and . IAAI, page 51-58. AAAI, (2001)The DEFACTO System: Coordinating Human-Agent Teams for the Future of Disaster Response., , , , and . Multi-Agent Programming, volume 15 of Multiagent Systems, Artificial Societies, and Simulated Organizations, Springer, (2005)SAVES: a sustainable multiagent application to conserve building energy considering occupants., , , , , , , , , and . AAMAS, page 21-28. IFAAMAS, (2012)Signaling in Bayesian Stackelberg Games., , , , and . AAMAS, page 150-158. ACM, (2016)A robust approach to addressing human adversaries in security games., , , , , and . AAMAS, page 1297-1298. IFAAMAS, (2012)Towards Adjustable Autonomy for the Real World., , and . J. Artif. Intell. Res., (2002)Monitoring Teams by Overhearing: A Multi-Agent Plan-Recognition Approach., , and . J. Artif. Intell. Res., (2002)RESC: An Approach for Real-time, Dynamic Agent Tracking., and . IJCAI, page 103-111. Morgan Kaufmann, (1995)Towards Efficient Computation of Error Bounded Solutions in POMDPs: Expected Value Approximation and Dynamic Disjunctive Beliefs., , , and . IJCAI, page 2638-2644. (2007)Quality Guarantees on k-Optimal Solutions for Distributed Constraint Optimization Problems., and . IJCAI, page 1446-1451. (2007)