Search

Your search keyword '"Charles Kamhoua"' showing total 18 results

Search Constraints

Start Over You searched for: Author "Charles Kamhoua" Remove constraint Author: "Charles Kamhoua"
18 results on '"Charles Kamhoua"'

Search Results

1. Optimal Honeypot Allocation Using Core Attack Graph in Partially Observable Stochastic Games

2. Enhancing Cyber Resilience Through Traffic Generation Patterns in Complex Networks: A Study on Cascading Failures

3. Designing a supervised feature selection technique for mixed attribute data analysis

4. Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement

5. Transfer learning for detecting unknown network attacks

6. Towards Blockchain Empowered Trusted and Accountable Data Sharing and Collaboration in Mobile Healthcare Applications

7. IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception

18. Reputation Routing in MANETs

Catalog

Books, media, physical & digital resources