Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep VULMAN: A deep reinforcement learning-enabled cyber vulnerability management framework., , and . Expert Syst. Appl., (July 2023)Measuring Classification Decision Certainty and Doubt., , , , and . CoRR, (2023)Real-time Network Intrusion Detection via Decision Transformers., , , , , and . CoRR, (2023)Stacked Generalizations in Imbalanced Fraud Data Sets using Resampling Methods., and . CoRR, (2020)A maximum expected covering problem for locating and dispatching two classes of military medical evacuation air assets., , and . Optim. Lett., 9 (8): 1511-1531 (2015)Robust Decision-Making in the Internet of Battlefield Things Using Bayesian Neural Networks., , , and . WSC, page 1-12. IEEE, (2021)Seeing the Whole Elephant - A Comprehensive Framework for Data Education., , , , and . SIGCSE (1), page 248-254. ACM, (2024)A Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning Models., , and . MILCOM, page 1011-1016. IEEE, (2021)Context-aware Collaborative Neuro-Symbolic Inference in IoBTs., , , , , and . MILCOM, page 1053-1058. IEEE, (2022)Payload-Byte: A Tool for Extracting and Labeling Packet Capture Files of Modern Network Intrusion Detection Datasets., , , , , and . BDCAT, page 58-67. IEEE, (2022)