Author of the publication

Risk Management using Behavior based Attack Graphs.

, , and . ITCC (1), page 445-449. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk Management Using Behavior Based Bayesian Networks., and . ISI, volume 3495 of Lecture Notes in Computer Science, page 115-126. Springer, (2005)Call Algebra., and . CCNC, page 854-858. IEEE, (2008)Socio-technical defense against voice spamming., and . ACM Trans. Auton. Adapt. Syst., 2 (1): 2 (2007)Nuisance level of a voice call., , and . ACM Trans. Multim. Comput. Commun. Appl., 5 (1): 6:1-6:22 (2008)A Novel Scheduling Strategy for MMT-Based Multipath Video Streaming., , , , , and . GLOBECOM, page 206-212. IEEE, (2018)Real-time Incremental Speech-to-Speech Translation of Dialogs., , , , and . HLT-NAACL, page 437-445. The Association for Computational Linguistics, (2012)Automatic Calibration Using Receiver Operating Characteristics Curves., , and . COMSWARE, IEEE, (2007)Ad-Net: Audio-Visual Convolutional Neural Network for Advertisement Detection In Videos., , , and . CoRR, (2018)Network risk management using attacker profiling., , and . Secur. Commun. Networks, 2 (1): 83-96 (2009)Risk Management using Behavior based Attack Graphs., , and . ITCC (1), page 445-449. IEEE Computer Society, (2004)