Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Boiling Frogs?. IEEE Secur. Priv., 1 (4): 5 (2003)Analytics for directed contact networks., and . Appl. Netw. Sci., 4 (1): 106:1-106:21 (2019)Instrumentation for distributed computing systems., , and . FJCC, page 344. ACM, (1987)Query routing optimization in sensor communication networks., and . CDC, page 1999-2004. IEEE, (2002)Keeping up with the changing web, and . IEEE Computer, 33 (5): 52--58 (May 2000)Observability Properties of Colored Graphs., , , , and . CoRR, (2018)TEL'M: Test and Evaluation of Language Models., , and . CoRR, (2024)Managing Malicious Insider Risk through BANDIT., , , and . HICSS, page 2422-2430. IEEE Computer Society, (2012)Learning Hidden Markov Models using Non-Negative Matrix Factorization, and . CoRR, (2008)Asymptotic Behavior of Attack Graph Games., and . From Database to Cyber Security, volume 11170 of Lecture Notes in Computer Science, page 104-112. Springer, (2018)