Author of the publication

Limiting Self-Propagating Malware Based on Connection Failure Behavior through Hyper-Compact Estimators.

, , , and . CoRR, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Message-Passing Algorithm for Optimizing Decentralized Detection Networks., and . IEEE Trans. Automat. Contr., 55 (3): 563-578 (2010)Opportunistic Multi-robot Environmental Sampling via Decentralized Markov Decision Processes., , and . DARS, volume 22 of Springer Proceedings in Advanced Robotics, page 163-175. Springer, (2021)Exploring the Tradeoffs Between Systematic and Random Exploration in Mobile Sensors., , , , and . MSWiM, page 209-216. ACM, (2023)Piece-wise constant models for RFID traffic., , and . RFID-TA, page 144-149. IEEE, (2016)Analysis of a Markov decision process model for intrusion tolerance.. DSN Workshops, page 156-161. IEEE Computer Society, (2010)Secure Multi-Robot Information Sampling with Periodic and Opportunistic Connectivity., , , , and . ICRA, page 4951-4957. IEEE, (2022)CNN-LSTM-Based Deep Recurrent Q-Learning for Robotic Gas Source Localization., , , , and . ICMLA, page 1060-1065. IEEE, (2023)On optimal decisions in an introduction-based reputation protocol., and . ICASSP, page 2969-2973. IEEE, (2013)On trusting introductions from a reputable source: A utility-maximizing probabilistic approach., , and . GlobalSIP, page 229-232. IEEE, (2013)Inference with Minimal Communication: a Decision-Theoretic Variational Approach., and . NIPS, page 675-682. (2005)