Author of the publication

Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense.

, , , , , and . IEEE Communications Magazine, 54 (6): 60-67 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A theory of utility and privacy of data sources., , and . ISIT, page 2642-2646. IEEE, (2010)Smart meter privacy: A utility-privacy framework., , , and . SmartGridComm, page 190-195. IEEE, (2011)A Human Capital Model for Mitigating Security Analyst Burnout., , , , , , and . SOUPS, page 347-359. USENIX Association, (2015)The Human Capital Model for Security Research: New Insights into Technology Transition.. CODASPY, page 171-172. ACM, (2017)Enhanced Security of Building Automation Systems Through Microkernel-Based Controller Platforms., , , , , , , , and . ICDCS Workshops, page 37-44. IEEE Computer Society, (2017)An information-theoretic approach to privacy., , and . Allerton, page 1220-1227. IEEE, (2010)Spy: A Method to Secure Clients for Network Services., , and . ICDCS Workshops, page 23-28. IEEE Computer Society, (2002)Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations., , , , , and . SOUPS, page 237-251. USENIX Association, (2016)Classification of UDP Traffic for DDoS Detection., , , , , and . LEET, USENIX Association, (2012)Secure RTOS Architecture for Building Automation., , , , , , and . CPS-SPC@CCS, page 79-90. ACM, (2015)