Author of the publication

Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks.

, , , , and . ARES, page 80-89. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transparent Insertion of Custom Logic in HTTP(S) Streams Using PbProxy., , , , , , and . IEEE Internet Comput., 15 (3): 43-50 (2011)Using self-diagnosis to adapt organizational structures., , and . Agents, page 529-536. ACM, (2001)An Event-based Data Model for Granular Information Flow Tracking., , , , and . TaPP, USENIX Association, (2020)Dynamic Explanation of Bayesian Networks with Abductive Bayes Factor Qualitative Propagation and Entropy-Based Qualitative Explanation., , , , , and . FUSION, page 1-9. IEEE, (2021)Expectation Failure as a Basis for Agent-Based Model Diagnosis and Mixed Initiative Model Adaptation during Anomalous Plan Execution., , , and . IJCAI, page 489-494. (2007)Semantic Links Across Distributed Heterogeneous Data., , , , , , , and . DCAI, volume 1003 of Advances in Intelligent Systems and Computing, page 107-115. Springer, (2019)Automated Self-Adaptation for Cyber-Defense - Pushing Adaptive Perimeter Protection Inward., , , , , , , , and . SASO Workshops, page 47-52. IEEE Computer Society, (2013)Managed Execution Environment as a Moving-Target Defense Infrastructure., , , and . IEEE Secur. Priv., 12 (2): 51-59 (2014)Understanding Rulelog Computations in Silk., , , , , , , , and . CoRR, (2013)Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks., , , , and . ARES, page 80-89. IEEE Computer Society, (2015)