Author of the publication

Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables.

, , , , and . J. Netw. Comput. Appl., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Game-Theoretic Modeling of Cyber Deception Against Epidemic Botnets in Internet of Things., , , and . IEEE Internet Things J., 9 (4): 2678-2687 (2022)Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement., , , , and . IEEE Access, (2021)A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory., , , and . MWSCAS, page 853-856. IEEE, (2018)Multi-level VM replication based survivability for mission-critical cloud computing., , , and . IM, page 1351-1356. IEEE, (2015)Game theoretic modeling of cyber deception in the Internet of Battlefield Things.. Allerton, page 862. IEEE, (2018)Secure-by-synthesis network with active deception and temporal logic specifications., , , , and . CoRR, (2020)Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables., , , , and . J. Netw. Comput. Appl., (2022)Decision Theory-Guided Deep Reinforcement Learning for Fast Learning., , , , , and . CoRR, (2024)Trusted Online Social Network (OSN) services with optimal data management., , , , and . Comput. Secur., (2014)Applying chaos theory for runtime Hardware Trojan detection., , , and . CISDA, page 1-6. IEEE, (2015)