Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Boundary Detection and Containment of Local Worm Infections., , and . SRUTI, USENIX Association, (2007)Quantitative Analysis of Active Cyber Defenses Based on Temporal Platform Diversity., , and . CoRR, (2014)Agent-based simulation for assessing network security risk due to unauthorized hardware., , , , , and . SpringSim (ADS), page 18-26. SCS/ACM, (2015)GPUE: Graphics Processing Unit Gross-Pitaevskii Equation solver., and . J. Open Source Software, 3 (32): 1037 (2018)Target Naming and Service Apoptosis., and . Recent Advances in Intrusion Detection, volume 1907 of Lecture Notes in Computer Science, page 217-226. Springer, (2000)Deriving Expertise Profiles from Tags., , and . CSE (4), page 34-41. IEEE Computer Society, (2009)Real-Time Underwater StereoFusion., , , , , and . Sensors, 18 (11): 3936 (2018)Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism., , and . RAID, volume 8688 of Lecture Notes in Computer Science, page 405-425. Springer, (2014)A Game Theoretic Approach to Strategy Determination for Dynamic Platform Defenses., , and . MTD@CCS, page 21-30. ACM, (2014)A Certified E-Mail Protocol., and . ACSAC, page 347-352. IEEE Computer Society, (1998)