Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots., , , and . FUZZ-IEEE, page 1-8. IEEE, (2018)Evaluating Automatically Generated YARA Rules and Enhancing Their Effectiveness., , , , and . SSCI, page 1146-1153. IEEE, (2020)Generating "dependent" quasi-random numbers., , and . WSC, page 527-536. WSC, (2000)Probabilistic inversion for chicken processing lines., , , and . Reliab. Eng. Syst. Saf., 91 (10-11): 1364-1372 (2006)Sampling algorithms for generating joint uniform distributions using the vine-copula method., and . Comput. Stat. Data Anal., 51 (6): 2889-2906 (2007)Calibration and information in expert resolution; a classical approach., , and . Autom., 24 (1): 87-93 (1988)Competing risk and the Cox proportional hazard model, and . Journal of Statistical Planning and Inference, 136 (5): 1621--1637 (May 1, 2006)The total time on test statistic and age-dependent censoring. Statistics & Probability Letters, 18 (4): 307--312 (Nov 9, 1993)Advanced input modeling: the vine copula method for representing high dimensional dependent distributions: application to continuous belief nets., and . WSC, page 270-278. WSC, (2002)Hybrid Method for Quantifying and Analyzing Bayesian Belief Nets., , and . Qual. Reliab. Eng. Int., 22 (6): 709-729 (2006)