From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Survey of Defensive Deception: Approaches Using Game Theory and Machine Learning., , , , , и . IEEE Commun. Surv. Tutorials, 23 (4): 2460-2493 (2021)Effective capacity of delay constrained cognitive radio links exploiting primary feedback., , , и . WiOpt, стр. 412-419. IEEE, (2013)Interference-based optimal power-efficient access scheme for cognitive radio networks., , , , и . ICNC, стр. 962-967. IEEE Computer Society, (2015)Effective capacity of cognitive radio links: Accessing primary feedback erroneously., , , и . ISWCS, стр. 395-400. IEEE, (2014)Stealthy edge decoy attacks against dynamic channel assignment in wireless networks., , , и . MILCOM, стр. 671-676. IEEE, (2015)A Network Centrality Game for Epidemic Control., , , , , и . GameSec, том 13727 из Lecture Notes in Computer Science, стр. 255-273. Springer, (2022)A game-theoretic framework for dynamic cyber deception in internet of battlefield things., , и . MobiQuitous, стр. 522-526. ACM, (2019)Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception., , , , , и . GameSec, том 11836 из Lecture Notes in Computer Science, стр. 21-32. Springer, (2019)Software Diversity for Cyber Deception., , , , и . GLOBECOM, стр. 1-6. IEEE, (2020)Mitigating Energy Depletion Attack In Wireless Sensor Network Using Signaling Game., , , , , и . ICC, стр. 6016-6021. IEEE, (2023)