Author of the publication

Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts.

, , , , , , , , and . IJCAI, page 381-387. ijcai.org, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BEXPLORER: Computer and Communication Control Using EEG., , , , , and . HCI (2), volume 5611 of Lecture Notes in Computer Science, page 579-587. Springer, (2009)Burn Before Reading: A stealthy framework for combating live forensics examinations., , , and . eCrime, page 1-10. IEEE, (2009)Performance evaluation of path splicing on the GÉANT and the Sprint networks., , and . Comput. Networks, 55 (17): 3947-3958 (2011)An abstraction layer for controlling heterogeneous mobile cyber-physical systems., and . CASE, page 117-121. IEEE, (2013)HELP: // Hypertext In-Emergency Leveraging Protocol., and . ICC, page 1-5. IEEE, (2009)Prime-based mimic functions for the implementation of covert channels., , and . WCNIS, page 538-543. IEEE, (2010)Collaborative Computing On-demand: Harnessing Mobile Devices in Executing On-the-Fly Jobs., , , and . MASS, page 342-350. IEEE Computer Society, (2013)Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks., , , and . ICN, page 445-450. IEEE Computer Society, (2009)Reduction of quality (RoQ) attacks on Internet end-systems., , , and . INFOCOM, page 1362-1372. IEEE, (2005)Stealthy edge decoy attacks against dynamic channel assignment in wireless networks., , , and . MILCOM, page 671-676. IEEE, (2015)