Search for persons
X
?
2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC) ,
1
Using Natural Language Processing Tools to Infer Adversary ..:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
2
The Credential is Not Enough: Deception with Honeypots and ..:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
3
Casino Rationale: Countering Attacker Deception in Zero-Sum..:
, In:
?
2022 IEEE 9th International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA) ,
4
3D Text Recognition and Localization From Point Clouds via ..:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
5
No Time to Lie: Bounds on the Learning Rate of a Defender f..:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
6
Lie Another Day: Demonstrating Bias in a Multi-round Cyber ..:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
7
You only Lie Twice: A Multi-round Cyber Deception Game of Q..:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
8