Author of the publication

Agent-based simulation for assessing network security risk due to unauthorized hardware.

, , , , , and . SpringSim (ADS), page 18-26. SCS/ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism., , and . RAID, volume 8688 of Lecture Notes in Computer Science, page 405-425. Springer, (2014)A Review of the Legal, Regulatory and Practical Aspects Needed to Unlock Autonomous Beyond Visual Line of Sight Unmanned Aircraft Systems Operations., , , and . J. Intell. Robotic Syst., 106 (1): 10 (2022)Real-Time Underwater StereoFusion., , , , , and . Sensors, 18 (11): 3936 (2018)Deriving Expertise Profiles from Tags., , and . CSE (4), page 34-41. IEEE Computer Society, (2009)Capturing the security effects of network segmentation via a continuous-time markov chain model., , , , and . SpringSim (ANSS), page 17:1-17:12. Society for Computer Simulation International / ACM, (2017)Quantitative Analysis of Active Cyber Defenses Based on Temporal Platform Diversity., , and . CoRR, (2014)Boundary Detection and Containment of Local Worm Infections., , and . SRUTI, USENIX Association, (2007)Vision-Based Localization System Suited to Resident Underwater Vehicles., , , , , and . Sensors, 20 (2): 529 (2020)Towards automated cyber decision support: A case study on network segmentation for security., , , , , , and . SSCI, page 1-10. IEEE, (2016)Environmental Key Generation Towards Clueless Agents., and . Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science, page 15-24. Springer, (1998)