Author of the publication

Security modeling and quantification of intrusion tolerant systems using attack-response graph.

, and . J. High Speed Networks, 13 (4): 297-308 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MOE quantification of missions using sensor data driven graph similarity metrics., and . SpringSim (ANSS), page 57-61. SCS/ACM, (2015)Target parameter estimation with heterogeneous sensor networks., , and . MFI, page 96-101. IEEE, (2010)Optimizing Border Patrol Operations Using Unmanned Aerial Vehicles., , , and . ITNG, page 479-484. IEEE Computer Society, (2015)Security modeling and quantification of intrusion tolerant systems using attack-response graph., and . J. High Speed Networks, 13 (4): 297-308 (2004)An escalator structure for adaptive beamforming., and . ICASSP, page 356-358. IEEE, (1983)A rapidly converging algorithm for adaptive beam forming.. ICASSP, page 1052-1055. IEEE, (1980)A method for modeling and quantifying the security attributes of intrusion tolerant systems., , , and . Perform. Evaluation, 56 (1-4): 167-186 (2004)Path preserving scale down for validation of internet inter-domain routing protocols., , , and . WSC, page 2210-2218. IEEE Computer Society, (2006)Security analysis of SITAR intrusion tolerance system., , and . SSRS@CCS, page 23-32. ACM, (2003)Increasing the Network Capacity for Multi-modal Multi-hop WSNs through Unsupervised Data Rate Adjustment., , , and . IDC, volume 382 of Studies in Computational Intelligence, page 183-193. Springer, (2011)