Author of the publication

Evaluating practitioner cyber-security attack graph configuration preferences.

, , and . Comput. Secur., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scene Segmentation and Understanding for Context-Free Point Clouds., , , and . PG (Short Papers), Eurographics Association, (2014)Deep Controllable Backlight Dimming for HDR Displays., , , , and . IEEE Trans. Consumer Electron., 68 (3): 191-199 (2022)High Dynamic Range in Cultural Heritage Applications., , and . Visual Computing for Cultural Heritage, Springer, (2020)Exploring Generative AI for Sim2Real in Driving Data Synthesis., , , , and . IV, page 3071-3077. IEEE, (2024)CapHDR2IR: Caption-Driven Transfer from Visible Light to Infrared Domain., , , , , , and . CoRR, (2024)Learning Preferential Perceptual Exposure for HDR Displays., , , , , and . IEEE Access, (2019)Generating Synthetic Training Images to Detect Split Defects in Stamped Components., , , and . IEEE Trans. Ind. Informatics, 20 (3): 4816-4827 (March 2024)Addressing Inconsistent Labeling With Cross Image Matching for Scribble-Based Medical Image Segmentation., , , , and . IEEE Trans. Image Process., (2025)Foreword - High dynamic range imaging., and . Comput. Graph., (2013)Interactive Cloud-based Global Illumination for Shared Virtual Environments., , , and . VS-GAMES, page 1-8. IEEE, (2019)