Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data-Driven Constraint Mining for Realizable Adversarial Samples., , , , , and . MILCOM, page 7-12. IEEE, (2023)A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions., , , and . ISPEC, volume 7232 of Lecture Notes in Computer Science, page 144-157. Springer, (2012)Adaptive Cyber Defenses for Botnet Detection and Mitigation., , , , and . Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, volume 11830 of Lecture Notes in Computer Science, Springer, (2019)On Detecting Manifestation of Adversary Characteristics., , , , , , , , and . MILCOM, page 431-437. IEEE, (2018)VulnerVAN: A Vulnerable Network Generation Tool., , , , , , , , , and 2 other author(s). MILCOM, page 1-6. IEEE, (2019)Harnessing the Power of Deception in Attack Graph-Based Security Games., , , , , , and . GameSec, volume 12513 of Lecture Notes in Computer Science, page 147-167. Springer, (2020)On Defensive Cyber Deception: A Case Study Using SDN., , , , , , , and . MILCOM, page 110-115. IEEE, (2018)Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception., , , , , and . GameSec, volume 11836 of Lecture Notes in Computer Science, page 21-32. Springer, (2019)R-Sentry: Deception based ransomware detection using file access patterns., , and . Comput. Electr. Eng., (2022)Combinatorial Boosting of Classifiers for Moving Target Defense Against Adversarial Evasion Attacks., , , and . MTD@CCS, page 13-21. ACM, (2021)