Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hierarchical performance model for intrusion detection in cyber-physical systems., and . WCNC, page 2095-2100. IEEE, (2011)Signalprint-Based Intrusion Detection in Wireless Networks., , and . SEWCN, volume 42 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 77-88. Springer, (2009)Parameterizing Moving Target Defenses., , and . NTMS, page 1-6. IEEE, (2016)A survey of intrusion detection in wireless network applications., and . Comput. Commun., (2014)Linkography abstraction refinement and cyber security., , and . CNS, page 595-601. IEEE, (2017)Further refinements to the foundations of cyber zone defense., and . MILCOM, page 823-828. IEEE, (2017)A zoning algorithm for dynamic cyber zone defense., and . CCWC, page 1-6. IEEE, (2017)A game theoretic model of computer network exploitation campaigns., and . CCWC, page 431-438. IEEE, (2018)Design and Analysis of Intrusion Detection Protocols in Cyber Physical Systems.. Virginia Tech, Blacksburg, VA, USA, (2013)base-search.net (ftvirginiatec:oai:vtechworks.lib.vt.edu:10919/19338).Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications., and . IEEE Trans. Syst. Man Cybern. Syst., 44 (5): 593-604 (2014)