Search for persons
X
?
2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC) ,
1
Using Natural Language Processing Tools to Infer Adversary ..:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
2
Casino Rationale: Countering Attacker Deception in Zero-Sum..:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
3
No Time to Lie: Bounds on the Learning Rate of a Defender f..:
, In:
?
Proceedings of the 7th Symposium on Hot Topics in the Science of Security ,
4
How to swap instructions midstream : an embedding algori..:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
5
Lie Another Day: Demonstrating Bias in a Multi-round Cyber ..:
, In:
?
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security ,
6
Game theory for adaptive defensive cyber deception:
, In:
?
2019 IEEE First International Conference on Cognitive Machine Intelligence (CogMI) ,
7
Creating Cyber Deception Games:
, In:
?
2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC) ,
9
The World (of CTF) is Not Enough Data: Lessons Learned from..:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
10
You only Lie Twice: A Multi-round Cyber Deception Game of Q..:
, In:
?
Proceedings of the Genetic and Evolutionary Computation Conference Companion ,
12
Learning from super-mutants : searching post-apocalyptic..:
, In:
?
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust ,
13
Proposing ambient visualization and pre-attentive processin..:
, In:
?
Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation ,
15