Author of the publication

Analysis and visualization of large complex attack graphs for networks security.

, , , , and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6570 of SPIE Proceedings, page 657004. SPIE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Game Theoretic Approach to Threat Prediction and Situation Awareness., , , , , and . J. Adv. Inf. Fusion, 2 (1): 35-48 (2007)An OpenViBE-based brainwave control system for Cerebot., , , , , and . ROBIO, page 1169-1174. IEEE, (2013)An adaptive P300 model for controlling a humanoid robot with mind., , , , , and . ROBIO, page 1390-1395. IEEE, (2013)Cooperative space object tracking using consensus-based filters., , , , , and . FUSION, page 1-8. IEEE, (2014)Game theoretic multiple mobile sensor management under adversarial environments., , , , and . FUSION, page 1-8. IEEE, (2008)Pedigree Information for Enhanced Situation and Threat Assessment., , , , , , , and . FUSION, page 1-8. IEEE, (2006)Online single target tracking in WAMI: benchmark and evaluation., , , , , , and . Multimedia Tools Appl., 77 (9): 10939-10960 (2018)An Exploration of Blockchain Enabled Decentralized Capability based Access Control Strategy for Space Situation Awareness., , , and . CoRR, (2018)Minimax anti-jammer design for FHSS/QPSK satellite communication systems., , , and . MILCOM, page 156-161. IEEE, (2016)Agile MU-MIMO in congested environments with robust channel estimation., , , , , and . MILCOM, page 473-478. IEEE, (2016)