Author of the publication

Network Situational Awareness: A Representative Study.

, , , and . Software Engineering (Workshops), volume P-150 of LNI, page 175-182. GI, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Aiding knowledge capture by searching for extensions of knowledge models., , , , , , , and . K-CAP, page 44-53. ACM, (2003)VINE: A Cyber Emulation Environment for MTD Experimentation., , , , and . MTD@CCS, page 43-47. ACM, (2015)Opportunities for Case-Based Reasoning in Personal Flow and Productivity Management., and . ICCBR, volume 12311 of Lecture Notes in Computer Science, page 349-354. Springer, (2020)A hybrid approach to improving program security., , and . SSCI, page 1-8. IEEE, (2017)Rapid Creation and Deployment of Communities of Interest Using the CMap Ontology Editor and the KAoS Policy Services Framework., , , and . NDT (1), volume 87 of Communications in Computer and Information Science, page 451-466. Springer, (2010)AOA: Ambient obstacle avoidance interface., , , and . RO-MAN, page 18-23. IEEE, (2014)Responsible Human-Centered Artificial Intelligence for the Cognitive Enhancement of Knowledge Workers., and . HCI (43), volume 13518 of Lecture Notes in Computer Science, page 568-582. Springer, (2022)Network Situational Awareness: A Representative Study., , , and . Software Engineering (Workshops), volume P-150 of LNI, page 175-182. GI, (2009)Human-Agent Teamwork in Cyber Operations: Supporting Co-evolution of Tasks and Artifacts with Luna., , , , , , and . MATES, volume 7598 of Lecture Notes in Computer Science, page 53-67. Springer, (2012)Semi-automated wrapping of defenses (SAWD) for cyber command and control., , , and . MILCOM, page 19-24. IEEE, (2016)