Author of the publication

Generation bidding game with potentially false attestation of flexible demand.

, , , , , , and . EURASIP J. Adv. Signal Process., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Arguing About Firewall Policy., , , and . COMMA, volume 245 of Frontiers in Artificial Intelligence and Applications, page 91-102. IOS Press, (2012)Security and Privacy for Emerging Smart Community Infrastructures., , , , , and . IoTBD, page 148-155. SciTePress, (2016)Firewall configuration: An application of multiagent metalevel argumentation., , , , , and . Argument Comput., 7 (2-3): 201-221 (2016)A framework for diversifying windows native APIs to tolerate code injection attacks., , , , and . AsiaCCS, page 392-394. ACM, (2007)Is Anybody Home? Inferring Activity From Smart Home Network Traffic., , , and . IEEE Symposium on Security and Privacy Workshops, page 245-251. IEEE Computer Society, (2016)Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach., , , , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 231-250. Springer, (2008)Privacy-preserving coordination for smart communities., , and . INFOCOM Workshops, page 1045-1046. IEEE, (2016)A distributed host-based worm detection system., , , , , and . LSAD@SIGCOMM, page 107-113. ACM, (2006)Argumentation logic to assist in security administration., , , , , and . NSPW, page 43-52. ACM, (2012)A hybrid quarantine defense., , , , , and . WORM, page 73-82. ACM Press, (2004)