Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Covert Channel-Based Transmitter Authentication in Controller Area Networks., , , , and . CoRR, (2019)A Multi-Agent Reinforcement Learning Approach for Dynamic Information Flow Tracking Games for Advanced Persistent Threats., , , , , and . CoRR, (2020)Global Practical Node and Edge Synchronization in Kuramoto Networks: A Submodular Optimization Framework., , , and . CoRR, (2014)Minimizing Convergence Error in Multi-Agent Systems via Leader Selection: A Supermodular Optimization Approach., , , and . CoRR, (2013)Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach., , , , and . CoRR, (2016)Maximizing the Smallest Eigenvalue of a Symmetric Matrix: A Submodular Optimization Approach., , , and . CoRR, (2017)Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (9): 2300-2314 (2019)A Supermodular Optimization Framework for Leader Selection under Link Noise in Linear Multi-Agent Systems, , and . CoRR, (2012)A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense., , , and . GameSec, volume 9406 of Lecture Notes in Computer Science, page 3-21. Springer, (2015)On leader selection for performance and controllability in multi-agent systems., , and . CDC, page 86-93. IEEE, (2012)