Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Trust Assessment Techniques to IoBT Systems., , , , , , and . MILCOM, page 833-840. IEEE, (2019)A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses., , , , , , and . CNS, page 1-9. IEEE, (2020)Honeypot Allocation over Attack Graphs in Cyber Deception Games., , and . ICNC, page 502-506. IEEE, (2020)Cybersecurity Deception Experimentation System., , , , and . SecDev, page 34-40. IEEE, (2020)Estimating Attack Risk of Network Activities in Temporal Domain: A Wavelet Transform Approach., , , , and . UEMCON, page 826-832. IEEE, (2020)An Effective Approach to Classify Abnormal Network Traffic Activities using Wavelet Transform., , , and . UEMCON, page 666-672. IEEE, (2019)Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables., , , , and . J. Netw. Comput. Appl., (2022)An Unsupervised Learning Approach for In-Vehicle Network Intrusion Detection.. CISS, page 1-4. IEEE, (2021)Software Diversity for Cyber Deception., , , , and . GLOBECOM, page 1-6. IEEE, (2020)A game-theoretic framework for dynamic cyber deception in internet of battlefield things., , and . MobiQuitous, page 522-526. ACM, (2019)