Author of the publication

Games of Timing for Security in Dynamic Environments.

, , and . GameSec, volume 9406 of Lecture Notes in Computer Science, page 57-73. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Online Experiment on Consumers' susceptibility to Fall for Post-Transaction Marketing Scams., and . ECIS, (2014)Enemy At the Gateways: A Game Theoretic Approach to Proxy Distribution., , , and . CoRR, (2017)An Economic Model and Simulation Results of App Adoption Decisions on Networks with Interdependent Privacy Consequences., and . GameSec, volume 8840 of Lecture Notes in Computer Science, page 246-265. Springer, (2014)"Hello. This is the IRS calling.": A case study on scams, extortion, impersonation, and phone spoofing., and . eCrime, page 57-69. IEEE, (2017)Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots., , , , and . RAID, page 214-231. ACM, (2022)What People Think AI Should Infer From Faces., , , and . FAccT, page 128-141. ACM, (2022)Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms., , and . ESORICS (2), volume 9879 of Lecture Notes in Computer Science, page 161-178. Springer, (2016)How reliable is the crowdsourced knowledge of security implementation?, , , , and . ICSE, page 536-547. IEEE / ACM, (2019)AI-Competent Individuals and Laypeople Tend to Oppose Facial Analysis AI., , , , and . EAAMO, page 9:1-9:12. ACM, (2022)RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis., , and . ACSAC, page 677-690. ACM, (2023)