Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism., , and . RAID, volume 8688 of Lecture Notes in Computer Science, page 405-425. Springer, (2014)A Review of the Legal, Regulatory and Practical Aspects Needed to Unlock Autonomous Beyond Visual Line of Sight Unmanned Aircraft Systems Operations., , , and . J. Intell. Robotic Syst., 106 (1): 10 (2022)Real-Time Underwater StereoFusion., , , , , and . Sensors, 18 (11): 3936 (2018)Capturing the security effects of network segmentation via a continuous-time markov chain model., , , , and . SpringSim (ANSS), page 17:1-17:12. Society for Computer Simulation International / ACM, (2017)Deriving Expertise Profiles from Tags., , and . CSE (4), page 34-41. IEEE Computer Society, (2009)Boundary Detection and Containment of Local Worm Infections., , and . SRUTI, USENIX Association, (2007)Quantitative Analysis of Active Cyber Defenses Based on Temporal Platform Diversity., , and . CoRR, (2014)Vision-Based Localization System Suited to Resident Underwater Vehicles., , , , , and . Sensors, 20 (2): 529 (2020)Towards automated cyber decision support: A case study on network segmentation for security., , , , , , and . SSCI, page 1-10. IEEE, (2016)Segmentation of Drone Collision Hazards in Airborne RADAR Point Clouds Using PointNet., , , , , , , and . CoRR, (2023)