From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On Detecting Manifestation of Adversary Characteristics., , , , , , , , и . MILCOM, стр. 431-437. IEEE, (2018)VulnerVAN: A Vulnerable Network Generation Tool., , , , , , , , , и 2 other автор(ы). MILCOM, стр. 1-6. IEEE, (2019)Reviving community networks: hyperlocality and suprathresholding in Web 2.0 designs., , , и . Pers. Ubiquitous Comput., 19 (2): 477-491 (2015)Towards a Human Factors Ontology for Cyber Security., , , и . STIDS, том 1523 из CEUR Workshop Proceedings, стр. 26-33. CEUR-WS.org, (2015)Development of decision rationale in complex group decision making., , , , и . CHI, стр. 1341-1350. ACM, (2009)Exploring design as a research activity., , , , , и . Conference on Designing Interactive Systems, стр. 365-366. ACM, (2006)Team performance in a series of regional and national US cybersecurity defense competitions: Generalizable effects of training and functional role specialization., , , и . Comput. Secur., (2021)Community Network 2.0: Visions, Participation, and Engagement in New Information Infrastructures., , , , , и . IS-EUD, том 6654 из Lecture Notes in Computer Science, стр. 270-275. Springer, (2011)Predicting proficiency in cyber defense team exercises., , , , , , и . MILCOM, стр. 776-781. IEEE, (2016)Evaluating the BOLT Application: Supporting Human Observation, Metrics, and Cognitive Work Analysis., , , , и . AHFE (10), том 268 из Lecture Notes in Networks and Systems, стр. 247-255. Springer, (2021)