From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimal Honeypot Allocation using Core Attack Graph in Cyber Deception Games., , , , и . PIMRC, стр. 1-6. IEEE, (2023)Dynamic Vulnerability Classification for Enhanced Cyber Situational Awareness., и . SysCon, стр. 1-8. IEEE, (2023)Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance., , , , , , и . GameSec, том 10575 из Lecture Notes in Computer Science, стр. 519-532. Springer, (2017)Game Theoretic Modeling to Enforce Security Information Sharing among Firms., , , , и . CSCloud, стр. 7-12. IEEE Computer Society, (2015)Achieving Runtime State Verification Assurance in Critical Cyber-Physical Infrastructures., , и . SmartGridComm, стр. 245-251. IEEE, (2021)Towards Developing a Scalable Cyber Risk Assessment and Mitigation Framework., и . SysCon, стр. 1-8. IEEE, (2024)Privacy-preserving cybersecurity information exchange mechanism., , и . SPECTS, стр. 1-7. IEEE, (2017)Integrating 5G Technology for Improved Process Monitoring and Network Slicing in ICS., , и . SmartGridComm, стр. 1-7. IEEE, (2023)Enabling Device Trustworthiness for SDN-Enabled Internet -of- Battlefield Things., , , и . DSC, стр. 1-7. IEEE, (2022)Non-Intrusive Deployment of Blockchain in Establishing Cyber-Infrastructure for Smart City., , и . SECON, стр. 1-6. IEEE, (2019)