Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis., , , , , and . HICSS, page 5244-5252. IEEE Computer Society, (2015)Network topology and mean infection times., , and . Soc. Netw. Anal. Min., 6 (1): 34:1-34:14 (2016)Resource graphs for modeling large-scale, highly congested systems., , and . WSC, page 523-529. WSC, (2001)Designing simultaneous simulation experiments., and . WSC, page 389-394. WSC, (1999)A Survey of Community Detection Algorithms Based On Analysis-Intent., , , and . Cyber Warfare, volume 56 of Advances in Information Security, Springer, (2015)Communicating uncertainty information across conceptual boundaries., , and . WSC, page 1096-1102. IEEE, (2011)Improved decision processes through simultaneous simulation and time dilation., and . WSC, page 743-748. WSC, (2000)Simulation optimization: a survey of simulation optimization techniques and procedures., , , and . WSC, page 119-128. WSC, (2000)Using Network Topology to Supplement High Assurance Systems., , and . HASE, page 213-219. IEEE Computer Society, (2016)Fortification Through Topological Dominance: Using Hop Distance and Randomized Topology Strategies to Enhance Network Security., , and . AAAI Spring Symposia, AAAI Press, (2016)