Cited By
View all- Yu LBrooks R(2018)Stochastic Tools for Network Intrusion DetectionProceedings of International Symposium on Sensor Networks, Systems and Security10.1007/978-3-319-75683-7_15(197-205)Online publication date: 24-May-2018
- Miehling ERasouli MTeneketzis DCybenko GHuang D(2015)Optimal Defense Policies for Partially Observable Spreading Processes on Bayesian Attack GraphsProceedings of the Second ACM Workshop on Moving Target Defense10.1145/2808475.2808482(67-76)Online publication date: 12-Oct-2015