From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Battle Ground: Data Collection and Labeling of CTF Games to Understand Human Cyber Operators., , , , , и . CSET @ USENIX Security Symposium, стр. 32-40. ACM, (2023)Adversarial Knapsack and Secondary Effects of Common Information for Cyber Operations., , , , и . CoRR, (2024)Malware Fingerprinting under Uncertainty., , , и . CSCloud, стр. 276-286. IEEE Computer Society, (2017)Institutions of Learning: A Report from the Trenches., , , , и . ICLS, International Society of the Learning Sciences, (1996)Weakly Supervised Extraction of Computer Security Events from Twitter., , , и . WWW, стр. 896-905. ACM, (2015)Cyber Security via Minority Games with Epistatic Signaling., , , , , и . BICT, ICST, (2014)Cyber Security via Signaling Games: Toward a Science of Cyber Security., , , , , , , и . ICDCIT, том 8337 из Lecture Notes in Computer Science, стр. 34-42. Springer, (2014)Perceiving Behavior of Cyber Malware with Human-Machine Teaming., , , , и . AHFE (9), том 960 из Advances in Intelligent Systems and Computing, стр. 97-108. Springer, (2019)Change Point Detection with Machine Learning for Rapid Ransomware Detection., и . DASC/PiCom/CBDCom/CyberSciTech, стр. 1-9. IEEE, (2022)Compliance signaling games: toward modeling the deterrence of insider threats., , , , и . Comput. Math. Organ. Theory, 22 (3): 318-349 (2016)