Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SODA: A System for Cyber Deception Orchestration and Automation., , , , , , and . ACSAC, page 675-689. ACM, (2021)ConChain: A Scheme for Contention-free and Attack Resilient BlockChain., , , , and . CoRR, (2023)DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of Malware., , , , and . CNS, page 1-9. IEEE, (2020)IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms., , , and . WCNC, page 1695-1700. IEEE, (2022)ConChain: A Scheme for Contention-Free and Attack Resilient BlockChain., , , , and . CCNC, page 1054-1055. IEEE, (2024)MRL-PoS: A Multi-agent Reinforcement Learning based Proof of Stake Consensus Algorithm for Blockchain., , , , and . CoRR, (2023)symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception., , , , , and . ACM Trans. Priv. Secur., 26 (4): 51:1-51:36 (November 2023)CHIMERA: Autonomous Planning and Orchestration for Malware Deception., , , , , and . CNS, page 173-181. IEEE, (2021)MRL-PoS: A Multi-agent Reinforcement Learning based Proof of Stake Consensus Algorithm for Blockchain., , , , and . CCWC, page 409-413. IEEE, (2024)