From post

Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets.

, , , и . GameSec, том 9996 из Lecture Notes in Computer Science, стр. 101-113. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dependability in edge computing., , , и . Commun. ACM, 63 (1): 58-66 (2020)Anomaly Detection through Transfer Learning in Agriculture and Manufacturing IoT Systems., , , , , и . CoRR, (2021)Benchmarking Algorithms for Federated Domain Generalization., , и . CoRR, (2023)Prediction of Resource Availability in Fine-Grained Cycle Sharing Systems Empirical Evaluation., , , и . J. Grid Comput., 5 (2): 173-195 (2007)How to Keep Your Head above Water While Detecting Errors., , , и . Middleware, том 5896 из Lecture Notes in Computer Science, стр. 205-225. Springer, (2009)Position statements from panelists: Smart cities-delusions of grandeur.. COMSNETS, стр. 599-600. IEEE, (2017)Capacity Bounds on Timing Channels with Bounded Service Times., , , и . ISIT, стр. 981-985. IEEE, (2007)RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network., , и . SECON, стр. 430-438. IEEE, (2010)GPUMixer: Performance-Driven Floating-Point Tuning for GPU Scientific Applications., , , и . ISC, том 11501 из Lecture Notes in Computer Science, стр. 227-246. Springer, (2019)Distributed online channel assignment toward optimal monitoring in multi-channel wireless networks., , и . INFOCOM, стр. 2626-2630. IEEE, (2012)