Author of the publication

A Malware Detector Placement Game for Intrusion Detection.

, , , , and . CRITIS, volume 5141 of Lecture Notes in Computer Science, page 311-326. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guest editorial: Special issue on data mining for information security., , and . Inf. Sci., (2013)A distributed multi-operator W2V2G management approach., , , , and . SmartGridComm, page 273-278. IEEE, (2011)Optimization and early-warning in DSL access networks based on simulation., , , , and . SimuTools, page 68. ICST/ACM, (2010)Service Centric Communication., and . Herausforderungen in der Wirtschaftsinformatik, page 245-265. Springer, (2006)Can you simulate traffic psychology? An analysis., and . Winter Simulation Conference, page 1539-1550. IEEE, (2013)Dispositive Supply-Web-Koordination durch Multiagentensysteme., , , , and . Wirtschaftsinformatik, 43 (2): 143-155 (2001)Agent Technology for Personalized Information Filtering: The PIA System., , , and . Scalable Computing: Practice and Experience, (2007)Conceptual architecture for self-discovering in fragmented service systems., and . NTMS, page 1-5. IEEE, (2015)Cooperative game theoretic approach to integrated bandwidth sharing and allocation., , , , and . GAMENETS, page 1-9. IEEE, (2009)Agent-based integration of an electric car sharing fleet into a smart distribution feeder., , , , and . ISGT Europe, page 1-8. IEEE, (2012)