Author of the publication

A Survey of Defensive Deception: Approaches Using Game Theory and Machine Learning.

, , , , , and . IEEE Commun. Surv. Tutorials, 23 (4): 2460-2493 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Community-Based Approach for Selecting Service Providers., and . ICWS, page 177-183. CSREA Press, (2003)Service-oriented Computing - Semantic, Processes, Agents, and . John Wiley & Sons, Ltd, (2005)An Event Algebra for Specifying and Scheduling Workflows., , , and . DASFAA, volume 5 of Advanced Database Research and Development Series, page 53-60. World Scientific, (1995)Service-Oriented Computing: Key Concepts and Principles, and . IEEE Internet Computing, 9 (1): 75-81 (2005)Formalizing and achieving multiparty agreements via commitments., and . AAMAS, page 770-777. ACM, (2005)Koko: architecture and methodology for engineering social affective applications., and . AAMAS (2), page 1137-1138. IFAAMAS, (2009)Choice, interoperability, and conformance in interaction protocols and service choreographies., , , , , and . AAMAS (2), page 843-850. IFAAMAS, (2009)E-commerce over communicators: challenges and solutions for user interfaces., , and . EC, page 177-186. ACM, (1999)Peer-to-Peer Computing for Information Systems.. AP2PC, volume 2530 of Lecture Notes in Computer Science, page 15-20. Springer, (2002)Commitments in the Architecture of a Limited, Rational Agent.. PRICAI Workshop on Intelligent Agent Systems, volume 1209 of Lecture Notes in Computer Science, page 72-87. Springer, (1996)