Author of the publication

Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach.

, , , , , and . CSCloud, page 382-389. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement., , , , and . IEEE Access, (2021)Game-Theoretic Modeling of Cyber Deception Against Epidemic Botnets in Internet of Things., , , and . IEEE Internet Things J., 9 (4): 2678-2687 (2022)A Deep Recurrent Neural Network Based Predictive Control Framework for Reliable Distributed Stream Data Processing., , , , , and . IPDPS, page 262-272. IEEE, (2019)Trusted Online Social Network (OSN) services with optimal data management., , , , and . Comput. Secur., (2014)A game-theoretic framework for dynamic cyber deception in internet of battlefield things., , and . MobiQuitous, page 522-526. ACM, (2019)On the use of design diversity in fault tolerant and secure systems: A qualitative analysis., , and . CISDA, page 1-8. IEEE, (2015)Applying chaos theory for runtime Hardware Trojan detection., , , and . CISDA, page 1-6. IEEE, (2015)Rethinking Information Sharing for Actionable Threat Intelligence., , , , and . CoRR, (2017)Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence., , , , and . CoRR, (2017)Cloud security certifications: a comparison to improve cloud service provider security., , , , , and . ICC, page 120:1-120:12. ACM, (2017)