The (logically) centralised architecture of the software-defined network...
Command, Control, Communication, and Intelligence (C3I) system is a kind...
Credit card frauds are at an ever-increasing rate and have become a majo...
Optimizing within the affine maximizer auctions (AMA) is an effective
ap...
Markets for zero-day exploits (software vulnerabilities unknown to the
v...
We study mechanism design for nonexcludable and excludable binary public...
Preventing organizations from Cyber exploits needs timely intelligence a...