Author of the publication

Fuzzy sets based team decision-making for Cyber Situation Awareness.

, , , , and . MILCOM, page 1077-1082. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A General Framework for Context Transfer in Mobile IP Networks., , and . VTC Spring, page 1017-1021. IEEE, (2006)Difficulty-level metric for cyber security training., , , , and . CogSIMA, page 172-178. IEEE, (2015)Distributed StealthNet (D-SN): Creating a live, virtual, constructive (LVC) environment for simulating cyber-attacks for test and evaluation (T&E)., , , , , , and . MILCOM, page 1284-1291. IEEE, (2015)Proactive context transfer and forced handover in IEEE 802.11 wireless LAN based access networks., , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 9 (3): 32-44 (2005)Fuzzy sets based team decision-making for Cyber Situation Awareness., , , , and . MILCOM, page 1077-1082. IEEE, (2016)Cognitive Task Analysis Based Training for Cyber Situation Awareness., , , , and . World Conference on Information Security Education, volume 453 of IFIP Advances in Information and Communication Technology, page 27-40. Springer, (2015)Fixed point forms of the parallel symmetric sandpile model, , , and . CoRR, (2011)Application of Degree Theory in Stability of the Complementarity Problem.. Math. Oper. Res., 12 (2): 368-376 (1987)Recursive Intergenerational Utility in Global Climate Risk Modeling, and . CIRANO Working Papers, 99s-40. CIRANO, (November 1999)Origami Folding Sequence Generation Using Discrete Particle Swarm Optimization., , , and . ICONIP (4), volume 10637 of Lecture Notes in Computer Science, page 484-493. Springer, (2017)