Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hierarchical performance model for intrusion detection in cyber-physical systems., and . WCNC, page 2095-2100. IEEE, (2011)A survey of intrusion detection in wireless network applications., and . Comput. Commun., (2014)Signalprint-Based Intrusion Detection in Wireless Networks., , and . SEWCN, volume 42 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 77-88. Springer, (2009)Further refinements to the foundations of cyber zone defense., and . MILCOM, page 823-828. IEEE, (2017)A zoning algorithm for dynamic cyber zone defense., and . CCWC, page 1-6. IEEE, (2017)A game theoretic model of computer network exploitation campaigns., and . CCWC, page 431-438. IEEE, (2018)Linkography abstraction refinement and cyber security., , and . CNS, page 595-601. IEEE, (2017)Parameterizing Moving Target Defenses., , and . NTMS, page 1-6. IEEE, (2016)Design and Analysis of Intrusion Detection Protocols in Cyber Physical Systems.. Virginia Tech, Blacksburg, VA, USA, (2013)base-search.net (ftvirginiatec:oai:vtechworks.lib.vt.edu:10919/19338).Foundations for Cyber Zone Defense., , and . ICCCN, page 1-7. IEEE, (2016)