Author of the publication

Learning Equilibria in Stochastic Information Flow Tracking Games with Partial Knowledge.

, , , , , , and . CDC, page 4053-4060. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding the prevalence and use of alternative plans in malware with network games., , , and . ACSAC, page 1-10. ACM, (2011)Heterogeneous networking: a new survivability paradigm., , , , and . NSPW, page 33-39. ACM, (2001)Hotspot-based traceback for mobile ad hoc networks., and . Workshop on Wireless Security, page 43-54. ACM, (2005)An assessment of VoIP covert channel threats., and . SecureComm, page 371-380. IEEE, (2007)RecProv: Towards Provenance-Aware User Space Record and Replay., , and . IPAW, volume 9672 of Lecture Notes in Computer Science, page 3-15. Springer, (2016)Measuring and Preventing Supply Chain Attacks on Package Managers., , , , , and . CoRR, (2020)Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising., , , , and . ACM Conference on Computer and Communications Security, page 129-140. ACM, (2014)Beheading hydras: performing effective botnet takedowns., , , , and . ACM Conference on Computer and Communications Security, page 121-132. ACM, (2013)Using artificial anomalies to detect unknown and known network intrusions., , , , and . Knowl. Inf. Syst., 6 (5): 507-527 (2004)RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking., , , , , , , and . CCS, page 377-390. ACM, (2017)