Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AWDRAT: A Cognitive Middleware System for Information Survivability., , , , , , , and . AI Magazine, 28 (3): 73-91 (2007)A Master Attack Methodology for an AI-Based Automated Attack Planner for Smart Cities., , , and . IEEE Access, (2018)One-Push Sharing: Facilitating Picture Sharing from Camera Phones., , and . Mobile HCI, volume 3160 of Lecture Notes in Computer Science, page 466-470. Springer, (2004)A plan-based mission control center for autonomous vehicles., and . IUI, page 277-279. ACM, (2004)Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance., , , , , , , , , and 4 other author(s). CoRR, (2021)Active Trust Management for Autonomous Adaptive Survivable Systems., and . IWSAS, volume 1936 of Lecture Notes in Computer Science, page 40-49. Springer, (2000)Introduction: The First International Workshop on Self-Adaptive Software., , and . IWSAS, volume 1936 of Lecture Notes in Computer Science, page 1-10. Springer, (2000)Preventing Kernel Hacks with HAKCs., , , , , , and . NDSS, The Internet Society, (2022)Supporting and Optimizing Full Unification in a Forward Chaining Rule System.. AAAI, page 710-715. AAAI Press / The MIT Press, (1993)Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity., , , , , , and . ACM Conference on Computer and Communications Security, page 901-913. ACM, (2015)