Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial Dynamics: The Conficker Case Study., , and . Moving Target Defense, volume 100 of Advances in Information Security, Springer, (2013)Issues in computational resource allocation in cooperative control., , and . ROBOCOMM, volume 318 of ACM International Conference Proceeding Series, page 50. ICST/ACM, (2007)Decision Support Procedure in the Insider Threat Domain., , and . IEEE Symposium on Security and Privacy Workshops, page 159-163. IEEE Computer Society, (2012)Managing Malicious Insider Risk through BANDIT., , , and . HICSS, page 2422-2430. IEEE Computer Society, (2012)Jesuit Latin Poets of the Seventeenth and Eighteenth Centuries: An Anthology of Neo-Latin Poetry. Bolchazy-Carducci Publishers, (1990)Demonstrating the ABELS System Using Real-World Scenarios., , , , and . SAINT, page 74-83. IEEE Computer Society, (2003)