From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A methodology for ensuring fair allocation of CSOC effort for alert investigation., , и . Int. J. Inf. Sec., 18 (2): 199-218 (2019)An Outsourcing Model for Alert Analysis in a Cybersecurity Operations Center., , , и . TWEB, 14 (1): 2:1-2:22 (2020)A Multiresolution Analysis-Assisted Reinforcement Learning Approach to Run-by-Run Control., , и . IEEE Trans Autom. Sci. Eng., 4 (2): 182-193 (2007)Fake Document Generation for Cyber Deception by Manipulating Text Comprehensibility., , , , и . IEEE Syst. J., 15 (1): 835-845 (2021)Work in progress - SUNRISE: Schools, university 'N' (and) resources in the sciences and engineering-a NSF/GMU GK-12 fellows project., , и . FIE, стр. 3. IEEE Computer Society, (2011)Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning., , , , и . IEEE Trans. Parallel Distributed Syst., 31 (1): 16-33 (2020)A methodology to measure and monitor level of operational effectiveness of a CSOC., , , и . Int. J. Inf. Sec., 17 (2): 121-134 (2018)Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System., , , , и . CoRR, (2018)A Strategy for Effective Alert Analysis at a Cyber Security Operations Center., и . From Database to Cyber Security, том 11170 из Lecture Notes in Computer Science, стр. 206-226. Springer, (2018)A Novel Team Formation Framework Based on Performance in a Cybersecurity Operations Center., , , , и . IEEE Trans. Serv. Comput., 16 (4): 2359-2371 (июля 2023)