Author of the publication

Agent-based simulation for assessing network security risk due to unauthorized hardware.

, , , , , and . SpringSim (ADS), page 18-26. SCS/ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent techniques for forecasting multiple time series in real-world systems., , , , and . Int. J. Intell. Comput. Cybern., 4 (3): 284-310 (2011)Using an evolutionary algorithm to solve the weighted view materialisation problem for data warehouses., and . Int. J. Intell. Inf. Database Syst., 7 (2): 163-179 (2013)Reports of the Workshops of the 32nd AAAI Conference on Artificial Intelligence., , , , , , , , , and 21 other author(s). AI Mag., 39 (4): 45-56 (2018)Evolution of classification rules for comprehensible knowledge discovery., , and . IEEE Congress on Evolutionary Computation, page 1261-1268. IEEE, (2007)Towards automated cyber decision support: A case study on network segmentation for security., , , , , , and . SSCI, page 1-10. IEEE, (2016)Assessing Mission Performance for Technology Reliant Missions., , , and . HICSS, page 1-9. ScholarSpace, (2020)Agent-based simulation in support of moving target cyber defense technology development and evaluation., , , , , and . SpringSim (CNS), page 16-23. SCS/ACM, (2015)Agent-based simulation for assessing network security risk due to unauthorized hardware., , , , , and . SpringSim (ADS), page 18-26. SCS/ACM, (2015)Adversarial co-evolution of attack and defense in a segmented computer network environment., , , , and . GECCO (Companion), page 1648-1655. ACM, (2018)Adaptive Attacker Strategy Development Against Moving Target Cyber Defenses., , , and . CoRR, (2014)