Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Countering Selfish Mining in Blockchains., , , and . CoRR, (2018)Rethinking information sharing for threat intelligence., , , , and . HotWeb, page 6:1-6:7. ACM, (2017)Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems., , , , , and . ICC, page 1-7. IEEE, (2019)Behavioral Cyber Deception: A Game and Prospect Theoretic Approach., , , and . GLOBECOM, page 1-6. IEEE, (2019)A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak., , , and . ICNC, page 457-462. IEEE, (2019)NAPF: Percolation driven probabilistic flooding for interference limited cognitive radio networks., , , and . ICC, page 7534-7539. IEEE, (2015)Contract-Theoretic Resource Allocation for Critical Infrastructure Protection., , , and . GLOBECOM, page 1-6. IEEE, (2015)Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments., , , , , and . WISA, volume 11897 of Lecture Notes in Computer Science, page 299-312. Springer, (2019)Understanding Dropout for Graph Neural Networks., , , , , and . WWW (Companion Volume), page 1128-1138. ACM, (2022)Optimal Honeypot Allocation using Core Attack Graph in Cyber Deception Games., , , , and . PIMRC, page 1-6. IEEE, (2023)