Author of the publication

Cognition and Technology.

, , , and . Cyber Defense and Situational Awareness, volume 62 of Advances in Information Security, Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cognition and Technology., , , and . Cyber Defense and Situational Awareness, volume 62 of Advances in Information Security, Springer, (2014)Learning and Planning in Feature Deception Games., , , , , , , and . CoRR, (2019)All the news that's fit to e-ink., , , , , , , and . CHI Extended Abstracts, page 3621-3626. ACM, (2008)Evaluating Models of Human Behavior in an Adversarial Multi-Armed Bandit Problem., , , , , , and . CogSci, page 394-400. cognitivesciencesociety.org, (2019)Balancing Fairness and Efficiency in Repeated Societal Interaction., , , and . CogSci, cognitivesciencesociety.org, (2013)Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense., , , , , , , , and . IEEE Commun. Surv. Tutorials, 22 (1): 709-745 (2020)Learning to cooperate in the Prisoner's Dilemma: Robustness of Predictions of an Instance-Based Learning Model., and . CogSci, cognitivesciencesociety.org, (2014)Predicting a screen area's perceived importance from spatial and physical attributes., , , and . J. Assoc. Inf. Sci. Technol., 62 (9): 1829-1838 (2011)CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War., and . Cyber Warfare, volume 56 of Advances in Information Security, Springer, (2015)Local alliances and rivalries shape near-repeat terror activity of al-Qaeda, ISIS and insurgents., , and . CoRR, (2019)