Author of the publication

Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets.

, , , and . GameSec, volume 9996 of Lecture Notes in Computer Science, page 101-113. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical Error Detection in a Software Implemented Fault Tolerance (SIFT) Environment., , , , and . IEEE Trans. Knowl. Data Eng., 12 (2): 203-224 (2000)Video through a crystal ball: effect of bandwidth prediction quality on adaptive streaming in mobile environments., , , , and . MoVid@MMSys, page 1:1-1:6. ACM, (2016)Vrisha: using scaling properties of parallel programs for bug detection and localization., , and . HPDC, page 85-96. ACM, (2011)Using big data for more dependability: a cellular network tale., , , and . HotDep, page 2:1-2:5. ACM, (2013)Do specialized distributed frameworks for bioinformatics applications obtain better performance over generic ones?, , , and . BCB, page 538. ACM, (2015)Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling., , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 271-290. Springer, (2008)Hermes: Fast and Energy Efficient Incremental Code Updates for Wireless Sensor Networks., and . INFOCOM, page 639-647. IEEE, (2009)Secure neighbor discovery through overhearing in static multihop wireless networks., , and . Comput. Networks, 55 (6): 1229-1241 (2011)TRIFECTA: Security, Energy Efficiency, and Communication Capacity Comparison for Wireless IoT Devices., , and . IEEE Internet Comput., 22 (1): 74-81 (2018)Energy-efficient on-demand reprogramming of large-scale sensor networks., , , , and . ACM Trans. Sens. Networks, 4 (1): 2:1-2:38 (2008)