Author of the publication

Security Games Applied to Real-World: Research Contributions and Challenges.

, , and . Moving Target Defense, volume 100 of Advances in Information Security, Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When should there be a "Me" in "Team"?: distributed multi-agent optimization under uncertainty., , , , and . AAMAS, page 109-116. IFAAMAS, (2010)DCOPs Meet the Real World: Exploring Unknown Reward Matrices with Applications to Mobile Sensor Networks., , , and . IJCAI, page 181-186. (2009)Path selection using available bandwidth estimation in overlay-based video streaming., and . Comput. Networks, 52 (12): 2411-2418 (2008)CoFFEE: Corrections For Formation Energy and Eigenvalues for charged defect simulations., and . Comput. Phys. Commun., (2018)Aspect-Oriented Approach for Testing Software Applications and Automatic Aspect Creation., and . Int. J. Softw. Eng. Knowl. Eng., 29 (10): 1379-1402 (2019)Size dependent electronic properties of silicon quantum dots - An analysis with hybrid, screened hybrid and local density functional theory., , , , , and . Comput. Phys. Commun., (2017)A Study of Phase Transitions in Security Games., , and . AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health, volume SS-12-03 of AAAI Technical Report, AAAI, (2012)Game-theoretic resource allocation for malicious packet detection in computer networks., , , , , and . AAMAS, page 905-912. IFAAMAS, (2012)Dynamic allocation of security resources for protecting public events., , and . AAMAS, page 1473-1474. IFAAMAS/ACM, (2014)An Overview of Recent Application Trends at the AAMAS Conference: Security, Sustainability and Safety., , and . AI Magazine, 33 (3): 14-28 (2012)