Kiekintveld, Christopher
90  Ergebnisse:
Personensuche X
?
1

Cyber Deception Against Zero-Day Attacks: A Game Theoretic ..:

, In: Lecture Notes in Computer Science; Decision and Game Theory for Security,
 
?
2

Honeypot Allocation for Cyber Deception in Dynamic Tactical..:

, In: Lecture Notes in Computer Science; Decision and Game Theory for Security,
 
?
3

Performance Comparison and Implementation of Bayesian Varia..:

, In: 2023 IEEE International Conference on Artificial Intelligence, Blockchain, and Internet of Things (AIBThings),
 
?
4

Enhancing IoT Device Security: Predicting and Analyzing Rec..:

, In: 2023 10th International Conference on Internet of Things: Systems, Management and Security (IOTSMS),
 
?
5

Optimizing Crop Recommendations for Sustainable Agriculture..:

, In: 2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON),
 
?
6

SPOT: Strategies for Power Trading in Wholesale Electricity..:

, In: Applied Innovation and Technology Management; Energy Sustainability through Retail Electricity Markets,
 
?
7

Bayesian Models for Node-Based Inference Techniques:

, In: 2023 IEEE International Systems Conference (SysCon),
Sharmin, Nazia ; Roy, Shanto ; Laszka, Aron.. - p. 1-8 , 2023
 
?
8

Strategic Cyber Camouflage:

, In: Advances in Information Security; Autonomous Intelligent Cyber Defense Agent (AICA),
 
?
9

A Systematic Approach for Temporal Traffic Selection Across..:

, In: 2023 32nd International Conference on Computer Communications and Networks (ICCCN),
 
?
11

Optimizing Honey Traffic Using Game Theory and Adversarial ..:

, In: Advances in Information Security; Cyber Deception,
Miah, Mohammad Sujan ; Zhu, Mu ; Granados, Alonso... - p. 97-124 , 2022
 
?
13

Diversifying Deception: Game-Theoretic Models for Two-Sided..:

, In: Advances in Information Security; Cyber Deception,
 
?
14

Lightweight On-Demand Honeypot Deployment for Cyber Decepti..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Digital Forensics and Cyber Crime,
 
1-15