Author of the publication

Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning.

, , , and . ACM TIST, 8 (1): 4:1-4:21 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Alert Data Aggregation and Transmission Prioritization over Mobile Networks., , and . Network Science and Cybersecurity, volume 55 of Advances in Information Security, Springer, (2014)Effectiveness of proactive reset for mitigating impact of stealthy attacks on networks of autonomous systems., , and . CNS, page 437-441. IEEE, (2016)Balanced permutations and multistage interconnection networks.. Int. J. Comput. Math., 73 (1): 125-137 (1999)SPDA: A Security Protocol for Data Aggregation in Large-Scale Wireless Sensor Networks., , and . EUC, volume 4096 of Lecture Notes in Computer Science, page 121-130. Springer, (2006)Guest editorial: 3G wireless and beyond., and . Comput. Commun., 26 (17): 1905-1906 (2003)A Code Assignment Algorithm for Nonblocking OVSF Codes in WCDMA., and . Telecommun. Syst., 25 (3-4): 417-431 (2004)Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors., , , and . Serv. Oriented Comput. Appl., 12 (2): 123-135 (2018)Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities., , , , , and . IEEE Trans. Veh. Technol., 63 (8): 3867-3874 (2014)A distributed dynamic channel and packet assignment for wireless multimedia traffic.. WCNC, page 1131-1135. IEEE, (2000)Risk-driven aggregation and transmission prioritization of cyber alerts over mobile networks., and . ICNC, page 58-62. IEEE, (2014)