Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Uncertainty in Cyber Security Investments., , , , and . CoRR, (2017)Security from the Adversary's Inertia-Controlling Convergence Speed When Playing Mixed Strategy Equilibria., , and . Games, 9 (3): 59 (2018)Multi-categorical Risk Assessment for Urban Critical Infrastructures., , and . CRITIS, volume 13139 of Lecture Notes in Computer Science, page 152-167. Springer, (2021)Password Security as a Game of Entropies., and . Entropy, 20 (5): 312 (2018)A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures., , , and . ARES, page 30:1-30:8. ACM, (2018)Supervised Machine Learning with Plausible Deniability., , , , and . Comput. Secur., (2022)Disappointment-Aversion in Security Games., , , and . GameSec, volume 11199 of Lecture Notes in Computer Science, page 314-325. Springer, (2018)Uncertainty in Games: Using Probability-Distributions as Payoffs., , and . GameSec, volume 9406 of Lecture Notes in Computer Science, page 346-357. Springer, (2015)On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies., , and . GameSec, volume 10575 of Lecture Notes in Computer Science, page 494-505. Springer, (2017)A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous Networks., , and . NordSec, volume 10014 of Lecture Notes in Computer Science, page 67-81. (2016)