关注
Taha Eghtesad
Taha Eghtesad
在 psu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Adversarial Deep Reinforcement Learning based Adaptive Moving Target Defense
T Eghtesad, Y Vorobeychik, A Laszka
11th International Conference on Decision and Game Theory for Security …, 2020
35*2020
Blockchains for Transactive Energy Systems: Opportunities, Challenges, and Approaches
S Eisele, C Barreto, A Dubey, X Koutsoukos, T Eghtesad, A Laszka, ...
Computer 53 (9), 66-76, 2020
252020
Cyber-attacks and mitigation in blockchain based transactive energy systems
C Barreto, T Eghtesad, S Eisele, A Laszka, A Dubey, X Koutsoukos
3rd IEEE Conference on Industrial Cyberphysical Systems (ICPS 2020) 1, 129-136, 2020
172020
Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem
O Akgul, T Eghtesad, A Elazari, O Gnawali, J Grossklags, ML Mazurek, ...
32nd USENIX Security Symposium (USENIX Security 2023), 2023
142023
Safe and Private Forward-Trading Platform for Transactive Microgrids
S Eisele, T Eghtesad, K Campanelli, P Agrawal, A Laszka, A Dubey
ACM Transactions on Cyber-Physical Systems (TCPS) 5 (1), 1-29, 2020
112020
The hackers’ viewpoint: Exploring challenges and benefits of bug-bounty programs
O Akgul, T Eghtesad, A Elazari, O Gnawali, J Grossklags, D Votipka, ...
Proceedings of the 2020 Workshop on Security Information Workers, ser. WSIW 20, 2020
112020
Mechanisms for Outsourcing Computation via a Decentralized Market
S Eisele, T Eghtesad, N Troutman, A Laszka, A Dubey
14th ACM International Conference on Distributed and Event-Based Systems …, 2020
72020
Multi-Agent Reinforcement Learning for Assessing False-Data Injection Attacks on Transportation Networks
T Eghtesad, S Li, Y Vorobeychik, A Laszka
Proceedings of the 23rd International Conference on Autonomous Agents and …, 2024
3*2024
Decentralized Computation Market for Stream Processing Applications
S Eisele, M Wilbur, T Eghtesad, K Silvergold, F Eisele, A Mukhopadhyay, ...
10th IEEE International Conference on Cloud Engineering (IC2E 2022), 2022
22022
Adversarial Reinforcement Learning For Cyber-Attack Prevention, Detection, and Mitigation
T Eghtesad
The Pennsylvania State University, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–10