Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial examples for network intrusion detection systems., , , , and . J. Comput. Secur., 30 (5): 727-752 (2022)An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience., , , , , , and . CoRR, (2023)Supervised Authorship Segmentation of Open Source Code Projects., , , , , and . Proc. Priv. Enhancing Technol., 2021 (4): 464-479 (2021)An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience., , , , , , and . MILCOM, page 855-860. IEEE, (2022)On the Robustness of Domain Constraints., , , , , and . CCS, page 495-515. ACM, (2021)Piecewise Linear and Stochastic Models for the Analysis of Cyber Resilience., , and . CISS, page 1-6. IEEE, (2023)Quantitative Measurement of Cyber Resilience: Modeling and Experimentation., , , , , , and . CoRR, (2023)Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments., , , , , , and . Proc. Priv. Enhancing Technol., 2019 (3): 389-408 (2019)Parameterized Surface Fitting via MAP Estimation for Binocular Stereo., , and . ICRA, page 2049-2053. IEEE Computer Society, (1995)Range Estimation of an Ultraviolet Communication Source using a Mobile Sensor., , , , and . WCNC, page 1-6. IEEE, (2023)