From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Embracing risk dependency in designing cyber-insurance contracts., , и . Allerton, стр. 926-933. IEEE, (2017)Provision of non-excludable public goods on networks: From equilibrium to centrality measures., и . Allerton, стр. 58-65. IEEE, (2015)Robust Control Barrier Functions for Sampled-Data Systems., , и . IEEE Control. Syst. Lett., (2024)Adversarial Contract Design for Private Data Commercialization., и . EC, стр. 681-699. ACM, (2019)Incentive Mechanisms for Strategic Classification and Regression Problems., , , , и . EC, стр. 760-790. ACM, (2022)Prioritizing Security Spending: A Quantitative Analysis of Risk Distributions for Different Business Profiles., , , и . WEIS, (2015)Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems., , , , , , и . CoRR, (2020)Protecting Assets with Heterogeneous Valuations under Behavioral Probability Weighting., , , , и . CDC, стр. 5374-5379. IEEE, (2019)Designing Cyber Insurance Policies: Mitigating Moral Hazard Through Security Pre-Screening., , и . GAMENETS, том 212 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 63-73. Springer, (2017)Safe Control Using High-Order Measurement Robust Control Barrier Functions., , и . ACC, стр. 4148-4154. IEEE, (2023)