Author of the publication

A Survey of Community Detection Algorithms Based On Analysis-Intent.

, , , and . Cyber Warfare, volume 56 of Advances in Information Security, Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis., , , , , and . HICSS, page 5244-5252. IEEE Computer Society, (2015)Network topology and mean infection times., , and . Soc. Netw. Anal. Min., 6 (1): 34:1-34:14 (2016)Designing simultaneous simulation experiments., and . WSC, page 389-394. WSC, (1999)Resource graphs for modeling large-scale, highly congested systems., , and . WSC, page 523-529. WSC, (2001)A Survey of Community Detection Algorithms Based On Analysis-Intent., , , and . Cyber Warfare, volume 56 of Advances in Information Security, Springer, (2015)Improved decision processes through simultaneous simulation and time dilation., and . WSC, page 743-748. WSC, (2000)Simulation optimization: a survey of simulation optimization techniques and procedures., , , and . WSC, page 119-128. WSC, (2000)Communicating uncertainty information across conceptual boundaries., , and . WSC, page 1096-1102. IEEE, (2011)Using Network Topology to Supplement High Assurance Systems., , and . HASE, page 213-219. IEEE Computer Society, (2016)Managing risk in high assurance systems by optimizing topological resources., , , and . Journal of Software: Evolution and Process, (2018)