Author of the publication

Analysis and visualization of large complex attack graphs for networks security.

, , , , and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6570 of SPIE Proceedings, page 657004. SPIE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GARP-face: Balancing privacy protection and utility preservation in face de-identification., , , and . IJCB, page 1-8. IEEE, (2014)Pragmatic data fusion uncertainty concerns: Tribute to Dave L. Hall., , , , , and . FUSION, page 472-479. IEEE, (2016)Random-point-based filters: analysis and comparison in target tracking., , , and . IEEE Trans. Aerospace and Electronic Systems, 51 (2): 1403-1421 (2015)A fast-converging space-time adaptive processing algorithm for non-Gaussian clutter suppression., , and . Digital Signal Processing, 22 (1): 74-86 (2012)Game Theoretic Approach to Threat Prediction and Situation Awareness., , , , , and . J. Adv. Inf. Fusion, 2 (1): 35-48 (2007)Probabilistic graphical models for multi-source fusion from text sources., and . CISDA, page 1-10. IEEE, (2015)URREF reliability versus credibility in information fusion (STANAG 2511)., , , , , and . FUSION, page 1600-1607. IEEE, (2013)Cooperative space object tracking using consensus-based filters., , , , , and . FUSION, page 1-8. IEEE, (2014)Comparison of adaptive and randomized unscented Kalman filter algorithms., , , and . FUSION, page 1-8. IEEE, (2014)Description of the Choquet Integral for tactical knowledge representation., and . FUSION, page 1-7. IEEE, (2010)