Author of the publication

Security Adoption in Heterogeneous Networks: the Influence of Cyber-Insurance Market.

, and . Networking (2), volume 7290 of Lecture Notes in Computer Science, page 172-183. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Reinforcement Learning Approach to Optimize Discount and Reputation Tradeoffs in E-commerce Systems., , and . ACM Trans. Internet Techn., 20 (4): 37:1-37:26 (2020)Enpublic Apps: Security Threats Using iOS Enterprise and Developer Certificates., , , , and . AsiaCCS, page 463-474. ACM, (2015)Achieving efficiency via fairness in online resource allocation., , , and . MobiHoc, page 101-110. ACM, (2022)DiffForward: On Balancing Forwarding Traffic for Modern Cloud Block Services via Differentiated Forwarding., , , , , and . SIGMETRICS (Abstracts), page 11-12. ACM, (2023)Efficient Explorative Key-Term Selection Strategies for Conversational Contextual Bandits., , , and . AAAI, page 10288-10295. AAAI Press, (2023)Introduction: Multimedia computing systems., and . Int. J. Intell. Syst., 13 (12): 1055-1058 (1998)Designing a Hierarchical Multimedia Storage Server., and . Comput. J., 40 (9): 529-540 (1997)Topology-Theoretic Approach To Address Attribute Linkage Attacks In Differential Privacy., , , and . INFOCOM Workshops, page 1-6. IEEE, (2021)Variance-Adaptive Algorithm for Probabilistic Maximum Coverage Bandits with General Feedback., , , , and . INFOCOM, page 1-10. IEEE, (2023)The shapley value: Its use and implications on internet economics., , , , and . Allerton, page 1094-1096. IEEE, (2008)