Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs., , , , , and . IEEE Trans. Control. Netw. Syst., 7 (4): 1585-1596 (2020)The Impact of Network Design Interventions on the Security of Interdependent Systems., , and . IEEE Trans. Control. Netw. Syst., 11 (1): 173-184 (March 2024)United We Fall: On the Nash Equilibria of Multiplex and Multilayer Network Games., and . CoRR, (2024)BASCPS: How does behavioral decision making impact the security of cyber-physical systems?, , , , , , and . CoRR, (2020)Opting Out of Incentive Mechanisms: A Study of Security as a Non-Excludable Public Good., and . IEEE Trans. Inf. Forensics Secur., 11 (12): 2790-2803 (2016)Personalized augmented reality via fog-based imitation learning., , , and . IoT-Fog@IoTDI, page 11-15. ACM, (2019)Exit equilibrium: Towards understanding voluntary participation in security games., and . INFOCOM, page 1-9. IEEE, (2016)Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems., , , , , , and . AsiaCCS, page 378-392. ACM, (2021)The Impact of Network Design Interventions on CPS Security., , and . CDC, page 3486-3492. IEEE, (2021)Inter-Temporal Incentives in Security Information Sharing Agreements., and . AAAI Workshop: Artificial Intelligence for Cyber Security, volume WS-16-03 of AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.