Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

You only Lie Twice: A Multi-round Cyber Deception Game of Questionable Veracity., , , , , and . GameSec, volume 11836 of Lecture Notes in Computer Science, page 65-84. Springer, (2019)PHANOTATE: a novel approach to gene identification in phage genomes., , , , and . Bioinform., 35 (22): 4537-4542 (2019)Decepti-SCADA: A Framework for Actively Defending Networked Critical Infrastructures., , , and . IoTBDS, page 69-77. SCITEPRESS, (2020)multiPhATE: bioinformatics pipeline for functional annotation of phage isolates., , , , , , , and . Bioinform., 35 (21): 4402-4404 (2019)Informing Autonomous Deception Systems with Cyber Expert Performance Data., , , and . CoRR, (2021)Lie Another Day: Demonstrating Bias in a Multi-round Cyber Deception Game of Questionable Veracity., , , , , , and . GameSec, volume 12513 of Lecture Notes in Computer Science, page 80-100. Springer, (2020)Decepti-SCADA: A cyber deception framework for active defense of networked critical infrastructures., , , , , and . Internet Things, (2020)No Time to Lie: Bounds on the Learning Rate of a Defender for Inferring Attacker Target Preferences., , , , , , and . GameSec, volume 13061 of Lecture Notes in Computer Science, page 138-157. Springer, (2021)