Author of the publication

A Game-Theoretic Approach to Respond to Attacker Lateral Movement.

, , , and . GameSec, volume 9996 of Lecture Notes in Computer Science, page 294-313. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving network resiliency using sound theoretical and practical methods. University of Illinois Urbana-Champaign, USA, (2020)A Game-Theoretic Approach to Respond to Attacker Lateral Movement., , , and . GameSec, volume 9996 of Lecture Notes in Computer Science, page 294-313. Springer, (2016)PowerAlert: An Integrity Checker using Power Measurement., , and . CoRR, (2017)Accounting for the Human User in Predictive Security Models., , , , and . PRDC, page 329-338. IEEE Computer Society, (2017)OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis., , , and . NDSS, The Internet Society, (2020)P4AIG: Circuit-Level Verification of P4 Programs., , , , and . DSN (Supplements), page 21-22. IEEE, (2019)POWERALERT: Integrity Checking Using Power Measurement and a Game-Theoretic Strategy., , and . DSN, page 514-525. IEEE Computer Society, (2018)Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems., , , , , and . PRDC, page 125-134. IEEE, (2018)Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks., , , , , and . CCS, page 3337-3351. ACM, (2021)Revisiting Client Puzzles for State Exhaustion Attacks Resilience., , , , , , and . DSN, page 617-629. IEEE, (2019)