Author of the publication

Using temporal probabilistic logic for optimal monitoring of security events with limited resources.

, , , and . J. Comput. Secur., 24 (6): 735-791 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Extension of Datalog for Graph Queries., , and . SEBD, page 177-184. Edizioni Libreria Progetto, Padova, Italy, (2012)Convolutional Neural Network Ensemble Fine-Tuning for Extended Transfer Learning., , and . BigData Congress, volume 10968 of Lecture Notes in Computer Science, page 110-123. Springer, (2018)ChoiceGAPs: Competitive Diffusion as a Massive Multi-player Game in Social Networks., , and . SUM, volume 9858 of Lecture Notes in Computer Science, page 303-319. Springer, (2016)Inverse Tree-OLAP: Definition, Complexity and First Solution., , and . SEBD, volume 2161 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Number of Minimal Hypergraph Transversals and Complexity of IFM with Infrequency: High in Theory, but Often Not so Much in Practice!, and . AI*IA, volume 11946 of Lecture Notes in Computer Science, page 193-209. Springer, (2019)An Effective Approach to Inverse Frequent Set Mining., , and . ICDM, page 806-811. IEEE Computer Society, (2009)Strategic Security Resource Allocation for Internet of Things., , , and . ICDCS, page 737-738. IEEE Computer Society, (2016)Detecting suspicious entities in Offshore Leaks networks., , and . Soc. Netw. Anal. Min., 9 (1): 62:1-62:15 (2019)Count Constraints for Inverse OLAP and Aggregate Data Exchange., , and . SEBD, page 27-34. Edizioni Libreria Progetto, Padova, Italy, (2012)PIE: A Data-Driven Payoff Inference Engine for Strategic Security Applications., , , , , , and . IEEE Trans. Comput. Soc. Syst., 7 (1): 42-57 (2020)