Author of the publication

Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance.

, , , , , , and . GameSec, volume 10575 of Lecture Notes in Computer Science, page 519-532. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory., , , and . MWSCAS, page 853-856. IEEE, (2018)Game theoretic analysis for resource allocation in dynamic multi-hop networks with arbitration., , , and . SysCon, page 1-8. IEEE, (2017)Consensus of Whom? A Spectrum of Blockchain Consensus Protocols and New Directions., , and . ISC2, page 1-8. IEEE, (2019)LightChain: On the Lightweight Blockchain for the Internet-of-Things., , , and . SMARTCOMP, page 444-448. IEEE, (2019)QOI: Assessing Participation in Threat Information Sharing., , , , , , and . ICASSP, page 6951-6955. IEEE, (2018)Combating Data Leakage Trojans in Sequential Circuits Through Randomized Encoding., , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 639-644. IEEE Computer Society, (2017)FPGA-oriented moving target defense against security threats from malicious FPGA tools., , , and . HOST, page 163-166. IEEE Computer Society, (2018)Consensus protocols for blockchain-based data provenance: Challenges and opportunities., , , , and . UEMCON, page 469-474. IEEE, (2017)CyVi: Visualization of Cyber-Attack and Defense Effects in Geographically Referenced Networks., , , and . CCNC, page 1-4. IEEE, (2020)Countering Selfish Mining in Blockchains., , , and . ICNC, page 360-364. IEEE, (2019)