Author of the publication

Pareto-Optimal Adversarial Defense of Enterprise Systems.

, , , , and . ACM Trans. Inf. Syst. Secur., 17 (3): 11:1-11:39 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hypergraph-Based Attack Models for Network Intrusion Detection., , , and . SEBD, page 61-68. (2014)PADUA: Parallel Architecture to Detect Unexplained Activities., , , , , and . ACM Trans. Internet Techn., 14 (1): 3:1-3:28 (2014)Deep Learning/PUF-based Item Identification for Supply Chain Management in a Distributed Ledger Framework., , , , , , and . BCCA, page 28-35. IEEE, (2023)Security of IoT Devices with PUF-Based ID Tags: Preventing Hardware Substitution by Combining SRAM Cells Pattern Signature and ML Techniques., , and . DASC/PiCom/CBDCom/CyberSciTech, page 905-910. IEEE, (2023)Intrusion Detection with Hypergraph-Based Attack Models., , , and . GKR, volume 8323 of Lecture Notes in Computer Science, page 58-73. Springer, (2013)Redundancy as a Measure of Fault-Tolerance for the Internet of Things: A Review., , and . PADG@ESORICS, volume 11550 of Lecture Notes in Computer Science, page 202-226. Springer, (2018)Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios., , , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 419-436. Springer, (2017)Shortfall-Based Optimal Security Provisioning for Internet of Things., , , and . ICDCS, page 2585-2586. IEEE Computer Society, (2017)Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things., , , and . ICDCS, page 656-666. IEEE Computer Society, (2017)PUF-based Smart Tags for Supply Chain Management., , , , and . ARES, page 41:1-41:7. ACM, (2021)