Author of the publication

Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks.

, , , , and . IEEE Trans. Information Forensics and Security, 11 (5): 1071-1086 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The priority curve algorithm for video summarization., , , and . Inf. Syst., 31 (7): 679-695 (2006)CARA: A Cultural-Reasoning Architecture., , , , , , , , and . IEEE Intelligent Systems, 22 (2): 12-16 (2007)Network Hardening - An Automated Approach to Improving Network Security, , and . Springer Briefs in Computer Science Springer, (2014)Image Similarity Based on Animate Vision: Information Path Matching., , , and . Multimedia Information Systems, page 66-75. Arizona State University, (2002)A probabilistic framework for jammer identification in MANETs., , , and . Ad Hoc Networks, (2014)Web personalization based on static information and dynamic user behavior., , , and . WIDM, page 80-87. ACM, (2004)Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data., , , , and . IEEE Trans. Knowl. Data Eng., 26 (3): 577-594 (2014)Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks., , , , and . IEEE Trans. Information Forensics and Security, 11 (5): 1071-1086 (2016)Security-Aware Scheduling of Mission Tasks under Temporal Constraints., and . UIC/ATC, page 452-457. IEEE Computer Society, (2013)Information Retrieval from the Web: An Interactive Paradigm., , , and . Multimedia Information Systems, volume 3665 of Lecture Notes in Computer Science, page 17-32. Springer, (2005)