Search for persons
X
?
2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC) ,
3
Using Natural Language Processing Tools to Infer Adversary ..:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
4
The Credential is Not Enough: Deception with Honeypots and ..:
, In:
?
2023 IEEE International Symposium on Information Theory (ISIT) ,
6
Correcting a substring edit error of bounded length:
, In:
?
2023 IEEE International Symposium on Information Theory (ISIT) ,
8
Finding a Burst of Positives via Nonadaptive Semiquantitati..:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
9
Casino Rationale: Countering Attacker Deception in Zero-Sum..:
, In:
?
2023 IEEE International Symposium on Information Theory (ISIT) ,
13