Personensuche
X
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
1
Cyber Deception Against Zero-Day Attacks: A Game Theoretic ..:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
2
Honeypot Allocation for Cyber Deception in Dynamic Tactical..:
, In:
?
2023 IEEE International Conference on Artificial Intelligence, Blockchain, and Internet of Things (AIBThings) ,
3
Performance Comparison and Implementation of Bayesian Varia..:
, In:
?
2023 10th International Conference on Internet of Things: Systems, Management and Security (IOTSMS) ,
4
Enhancing IoT Device Security: Predicting and Analyzing Rec..:
, In:
?
2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) ,
5
Optimizing Crop Recommendations for Sustainable Agriculture..:
, In:
?
Applied Innovation and Technology Management; Energy Sustainability through Retail Electricity Markets ,
6
SPOT: Strategies for Power Trading in Wholesale Electricity..:
, In:
?
2023 IEEE International Systems Conference (SysCon) ,
7
Bayesian Models for Node-Based Inference Techniques:
, In:
?
Advances in Information Security; Autonomous Intelligent Cyber Defense Agent (AICA) ,
8
Strategic Cyber Camouflage:
, In:
?
2023 32nd International Conference on Computer Communications and Networks (ICCCN) ,
9
A Systematic Approach for Temporal Traffic Selection Across..:
, In:
?
Advances in Information Security; Cyber Deception ,
11
Optimizing Honey Traffic Using Game Theory and Adversarial ..:
, In:
?
Advances in Information Security; Cyber Deception ,
13
Diversifying Deception: Game-Theoretic Models for Two-Sided..:
, In:
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Digital Forensics and Cyber Crime ,
14