Author of the publication

Using Deception in Markov Game to Understand Adversarial Behaviors Through a Capture-The-Flag Environment.

, , , , and . GameSec, volume 13727 of Lecture Notes in Computer Science, page 87-106. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Modeling and Verification of Agent-Based Traffic Simulation Properties in Alloy., , and . Int. J. Agent Technol. Syst., 4 (4): 38-60 (2012)Automating Cyberdeception Evaluation with Deep Learning., , , , , , and . HICSS, page 1-10. ScholarSpace, (2020)Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses., , , , and . SP, page 987-1004. IEEE, (2023)POSTER: Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality., , , and . CCS, page 2523-2525. ACM, (2017)Using Deception in Markov Game to Understand Adversarial Behaviors Through a Capture-The-Flag Environment., , , , and . GameSec, volume 13727 of Lecture Notes in Computer Science, page 87-106. Springer, (2022)Evidential Cyber Threat Hunting., , , , and . CoRR, (2021)DIVAs 4.0: A Multi-Agent Based Simulation Framework., , , , and . DS-RT, page 105-114. IEEE Computer Society, (2013)Dressed up: Baiting Attackers through Endpoint Service Projection., , , and . SDN-NFV@CODASPY, page 23-28. ACM, (2018)Crook-sourced intrusion detection as a service., , , , , and . J. Inf. Secur. Appl., (2021)Towards an Open Format for Scalable System Telemetry., , and . CoRR, (2021)