Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Monitoring stealthy diffusion., , , , and . Knowl. Inf. Syst., 52 (3): 657-685 (2017)Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality., , and . GameSec, volume 7638 of Lecture Notes in Computer Science, page 152-170. Springer, (2012)Becoming Cybercriminals: Incentives in Networks with Interdependent Security - Incentives in Networks with Interdependent Security., and . GameSec, volume 9996 of Lecture Notes in Computer Science, page 349-369. Springer, (2016)PlaTIBART: a platform for transactive IoT blockchain applications with repeatable testing., , , and . M4IoT@Middleware, page 17-22. ACM, (2017)Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts., and . POST, volume 10804 of Lecture Notes in Computer Science, page 270-277. Springer, (2018)On the Economics of Ransomware., , and . GameSec, volume 10575 of Lecture Notes in Computer Science, page 397-417. Springer, (2017)Strategic Remote Attestation: Testbed for Internet-of-Things Devices and Stackelberg Security Game for Optimal Strategies., , , and . GameSec, volume 13061 of Lecture Notes in Computer Science, page 271-290. Springer, (2021)Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning., , , , and . AAAI, page 946-953. AAAI Press, (2020)Principled Data-Driven Decision Support for Cyber-Forensic Investigations., , , and . AAAI, page 5010-5017. AAAI Press, (2023)Cyber-Physical Simulation Platform for Security Assessment of Transactive Energy Systems., , , , and . MSCPES@CPSIoTWeek, page 1-6. IEEE, (2019)