Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine Learning Cyberattack and Defense Strategies., , , , and . Comput. Secur., (2020)Matrix Reduction Verification of Extended Petri Nets., , , and . ACM Southeast Regional Conference, page 296-299. ACM, (2020)Component-based Implementation of Cyberattack Simulation Models., , , , and . ACM Southeast Regional Conference, page 64-71. ACM, (2019)Physics-based modeling of crowd evacuation in the Unity game engine., , , and . Int. J. Model. Simul. Sci. Comput., 9 (4): 1850029:1-1850029:31 (2018)A bottom-up approach to creating a cyberattack model with fine grain components., , , and . ACM Southeast Conference, page 25-32. ACM, (2021)Modeling cyberattacks with extended Petri nets., , , , , , and . ACM Southeast Regional Conference, page 67-73. ACM, (2022)Machine Learning Cyberattack Strategies with Petri Nets with Players, Strategies, and Costs., , , , , and . NCS, volume 1055 of Advances in Intelligent Systems and Computing, page 232-247. Springer, (2019)Wolf sheep predation: reimplementing a predator-prey ecosystem model as an instructional exercise in agent-based modeling., , , , and . ACM Southeast Regional Conference, page 38-43. ACM, (2022)