Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Active Perception for Cyber Intrusion Detection and Defense., , , , , , , and . AAAI Workshop: Artificial Intelligence for Cyber Security, volume WS-16-03 of AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.Qualitative Reasoning about Cyber Intrusions., , , , and . AAAI Workshops, volume WS-17 of AAAI Technical Report, AAAI Press, (2017)A Model of Learning by Incremental Analogical Reasoning and Debugging.. AAAI, page 45-48. AAAI Press, (1983)FUZZBUSTER: Towards Adaptive Immunity from Cyber Threats., , , , , and . SASO Workshops, page 137-140. IEEE Computer Society, (2011)Implementing a Model of Human Plausible Reasoning., , and . IJCAI, page 185-188. Morgan Kaufmann, (1987)Research Directions for Service-Oriented Multiagent Systems., , , , , , , , , and 10 other author(s). IEEE Internet Comput., 9 (6): 65-70 (2005)A Context Driven Approach for Workflow Mining., , and . IJCAI, page 1798-1803. (2009)Infrastructure for Semantic Interoperability and Integration: Breakout Discussion Summary., and . Semantic Interoperability and Integration, volume 04391 of Dagstuhl Seminar Proceedings, IBFI, Schloss Dagstuhl, Germany, (2005)The Many Faces of Mapping and Translation for Semantic Web Services.. WISE, page 261-268. IEEE Computer Society, (2003)Integrating Agent-Based Mixed-Initiative Control with an Existing Multi-Agent Planning System., , and . ICMAS, page 389-390. IEEE Computer Society, (2000)