Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data-Driven Constraint Mining for Realizable Adversarial Samples., , , , , and . MILCOM, page 7-12. IEEE, (2023)A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions., , , and . ISPEC, volume 7232 of Lecture Notes in Computer Science, page 144-157. Springer, (2012)Adaptive Cyber Defenses for Botnet Detection and Mitigation., , , , and . Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, volume 11830 of Lecture Notes in Computer Science, Springer, (2019)On Detecting Manifestation of Adversary Characteristics., , , , , , , , and . MILCOM, page 431-437. IEEE, (2018)VulnerVAN: A Vulnerable Network Generation Tool., , , , , , , , , and 2 other author(s). MILCOM, page 1-6. IEEE, (2019)Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception., , , , , and . GameSec, volume 11836 of Lecture Notes in Computer Science, page 21-32. Springer, (2019)On Defensive Cyber Deception: A Case Study Using SDN., , , , , , , and . MILCOM, page 110-115. IEEE, (2018)Harnessing the Power of Deception in Attack Graph-Based Security Games., , , , , , and . GameSec, volume 12513 of Lecture Notes in Computer Science, page 147-167. Springer, (2020)Moving Target Defense Quantification., , , and . Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, volume 11830 of Lecture Notes in Computer Science, Springer, (2019)An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model., , , and . ACISP, volume 7372 of Lecture Notes in Computer Science, page 166-179. Springer, (2012)