Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-objective optimization for security games., , , , and . AAMAS, page 863-870. IFAAMAS, (2012)An extended study on multi-objective security games., , , , and . Auton. Agents Multi Agent Syst., 28 (1): 31-71 (2014)Value-driven procurement in the TAC supply chain game., , , and . SIGecom Exch., 4 (3): 9-18 (2004)Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service., , , , , , and . Interfaces, 40 (4): 267-290 (2010)Local Context Normalization: Revisiting Local Normalization., , , , , , and . CoRR, (2019)Protecting the NECTAR of the Ganga River Through Game-Theoretic Factory Inspections., , , , , , , and . PAAMS, volume 9662 of Lecture Notes in Computer Science, page 97-108. Springer, (2016)Adapting Honeypot Configurations to Detect Evolving Exploits., and . AAAI Workshops, volume WS-17 of AAAI Technical Report, AAAI Press, (2017)Towards the Integration of Multi-Attribute Optimization and Game Theory for Border Security Patrolling Strategies., , , , , and . Applied Adversarial Reasoning and Risk Modeling, volume WS-11-06 of AAAI Technical Report, AAAI, (2011)Bandits for Cybersecurity: Adaptive Intrusion Detection Using Honeypots., and . AAAI Workshop: Artificial Intelligence for Cyber Security, volume WS-16-03 of AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.Integrated Learning and Feature Selection for Deep Neural Networks in Multispectral Images., , , , , and . CVPR Workshops, page 1196-1205. Computer Vision Foundation / IEEE Computer Society, (2018)