Author of the publication

Security Games Applied to Real-World: Research Contributions and Challenges.

, , and . Moving Target Defense, volume 100 of Advances in Information Security, Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An output structure for a bi-modal 6.4-Gbps GDDR5 and 2.4-Gbps DDR3 compatible memory interface., , , , , and . CICC, page 1-4. IEEE, (2011)Security Games with Arbitrary Schedules: A Branch and Price Approach., , , , and . AAAI, AAAI Press, (2010)Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty., , , and . AAAI, AAAI Press, (2011)Information Disclosure as a Means to Security., , , and . AAMAS, page 645-653. ACM, (2015)Securing networks using game theory: algorithms and applications.. AAMAS, page 1345-1346. IFAAMAS, (2011)Mixed-Initiative Optimization in Security Games: A Preliminary Report., , , and . AAAI Spring Symposium: Help Me Help You: Bridging the Gaps in Human-Agent Collaboration, AAAI, (2011)Game theory for security: Key algorithmic principles, deployed systems, lessons learned., , , and . Allerton Conference, page 1822-1829. IEEE, (2012)End-to-end available bandwidth: measurement methodology, dynamics, and relation with TCP throughput., and . SIGCOMM, page 295-308. ACM, (2002)A Unique Coupled Common Fixed Point Theorem for Symmetric (φ, ψ)-Contractive Mappings in Ordered G-Metric Spaces with Applications., and . J. Applied Mathematics, (2013)End-to-end estimation of the available bandwidth variation range., and . SIGMETRICS, page 265-276. ACM, (2005)