Author of the publication

A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications.

, , , , , , and . AAMAS, page 178-186. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices., , , , , and . CCS, page 2931-2945. ACM, (2022)An Investigation of Large Language Models for Real-World Hate Speech Detection., , , , , , and . ICMLA, page 1568-1573. IEEE, (2023)Discovering and Using Patterns for Countering Security Challenges.. Arizona State University, Tempe, USA, (2014)base-search.net (ftarizonastateun:item:26801).A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications., , , , , , and . AAMAS, page 178-186. ACM, (2017)Toward a Moving Target Defense for Web Applications., , , and . IRI, page 510-517. IEEE Computer Society, (2015)SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms., , , , , and . CODASPY, page 161-163. ACM, (2018)On the Safety and Efficiency of Virtual Firewall Elasticity Control., , , , , , and . NDSS, The Internet Society, (2017)Understanding and Detecting Remote Infection on Linux-based IoT Devices., , , , , , and . AsiaCCS, page 873-887. ACM, (2022)Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies., , , , and . SACMAT, page 195-206. ACM, (2019)ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems., , , and . MSCPES@CPSIoTWeek, page 1-6. IEEE, (2019)