From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Game Theoretic Framework for Software Diversity for Network Security., , , и . GameSec, том 12513 из Lecture Notes in Computer Science, стр. 297-311. Springer, (2020)Improved computational models of human behavior in security games., , , , и . AAMAS, стр. 1155-1156. IFAAMAS, (2011)Security Games with Limited Surveillance., , , , , , и . AAAI, стр. 1241-1248. AAAI Press, (2012)Using Correlated Strategies for Computing Stackelberg Equilibria in Extensive-Form Games., , , , и . AAAI, стр. 439-445. AAAI Press, (2016)Initial Exploration of Machine Learning to Predict Customer Demand in an Energy Market Simulation., и . AAAI Workshop: Trading Agent Design and Analysis, том WS-13-15 из AAAI Technical Report, AAAI, (2013)How to protect a city: strategic security placement in graph-based domains., , , , , и . AAMAS, стр. 1453-1454. IFAAMAS, (2010)On the Defense Against Adversarial Examples Beyond the Visible Spectrum., , , и . MILCOM, стр. 1-5. IEEE, (2018)Editor's Introduction to the Special Issue on Quantitative Risk Analysis Techniques for Security Applications., , , и . Informatica (Slovenia), 34 (2): 127-128 (2010)Optimal Network Security Hardening Using Attack Graph Games., , , и . IJCAI, стр. 526-532. AAAI Press, (2015)Empirical game-theoretic analysis of the TAC Supply Chain game., , и . AAMAS, стр. 193. IFAAMAS, (2007)