Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ancile: Pervasively Shared Situational Awareness, , , and . IEEE Internet Computing, 12 (1): 48-50 (2008)Humans as the Strong Link in Securing the Total Learning Architecture., , and . AHFE (9), volume 593 of Advances in Intelligent Systems and Computing, page 211-223. Springer, (2017)Ancile: Pervasively Shared Situational Awareness., , , and . IEEE Internet Comput., 12 (1): 48-50 (2008)Cognitive Agents for Adaptive Training in Cyber Operations., , , and . HCI (32), volume 11597 of Lecture Notes in Computer Science, page 505-520. Springer, (2019)Weapon and communication systems: modeling the wireless network architecture of land warrior., , , and . WSC, page 960-966. WSC, (2002)Anatomy of a Secure and Scalable Multiagent System for Event Capture and Correlation., , and . ICEIS (2), page 233-238. (2005)Towards a definition of cyberspace tactics, techniques and procedures., , , and . IEEE BigData, page 4674-4679. IEEE Computer Society, (2017)Obstacle Avoidance for Utility-Based Geocasting., and . ITNG, page 338-343. IEEE Computer Society, (2009)A cooperative spatial-aware cache for mobile environments., , and . MobiDE, page 65-72. ACM, (2010)Cybersecurity: What I Hope Someone's Teaching.. SIGITE, page 1-2. ACM, (2019)