Author of the publication

Automated Decision Making for Active Cyber Defense: Panel Discussion.

, , and . SafeConfig@CCS, page 59. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A declarative approach for global network security configuration verification and evaluation., and . Integrated Network Management, page 531-538. IEEE, (2011)A formal model for verifying stealthy attacks on state estimation in power grids., , and . SmartGridComm, page 414-419. IEEE, (2013)A formal model for sustainable vehicle-to-grid management., , and . SEGS@CCS, page 81-92. ACM, (2013)On the Feasibility of Sybil Attacks in Shard-Based Permissionless Blockchains., , , , and . CoRR, (2020)A game-theoretic approach for deceiving Remote Operating System Fingerprinting., , and . CNS, page 73-81. IEEE, (2013)IoTSAT: A formal framework for security analysis of the internet of things (IoT)., , , , and . CNS, page 180-188. IEEE, (2016)Formal synthesis of dependable configurations for advanced metering infrastructures., and . SmartGridComm, page 289-294. IEEE, (2015)Trajectory Synthesis for a UAV Swarm Based on Resilient Data Collection Objectives., , , , , , and . IEEE Trans. Netw. Serv. Manag., 20 (1): 138-151 (March 2023)Deep learning-based energy harvesting with intelligent deployment of RIS-assisted UAV-CFmMIMOs., , and . Comput. Networks, (June 2023)Blockchain-based Privacy-Preserving Charging Coordination Mechanism for Energy Storage Units., , , , , and . CoRR, (2018)