Author of the publication

Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments.

, , , , and . GameSec, volume 9996 of Lecture Notes in Computer Science, page 415-434. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OASiS: A Service-Oriented Architecture for Ambient-Aware Sensor Networks., , , , and . Monterey Workshop, volume 4888 of Lecture Notes in Computer Science, page 125-149. Springer, (2006)Design and simulation platform for evaluation of grid distribution system and transactive energy., , , and . HotSoS, page 15:1-15:2. ACM, (2019)Graph-Theoretic Approach for Increasing Participation in Networks With Assorted Resources., , , and . IEEE Trans. Netw. Sci. Eng., 7 (3): 930-946 (2020)Optimal and efficient adaptation in distributed real-time systems with discrete rates., , and . Real Time Syst., 49 (3): 339-366 (2013)Real-time detection of deception attacks in cyber-physical systems., and . Int. J. Inf. Sec., 22 (5): 1099-1114 (October 2023)Biodiesel sim: crowdsourcing simulations for complex model analysis., , and . SpringSim (ANSS), page 3. SCS/ACM, (2014)Dynamic Software Reconfiguration in Sensor Networks., , and . Systems Communications, page 413-420. IEEE Computer Society, (2005)On augmenting topological graph representations for attributed graphs., , , , , and . Appl. Soft Comput., (March 2023)A Graph Machine Learning Framework to Compute Zero Forcing Sets in Graphs., , , and . IEEE Trans. Netw. Sci. Eng., 11 (2): 2110-2123 (March 2024)Resilient distributed vector consensus using centerpoint., , , and . Autom., (2022)