Linda's BibTeX databases


Try searching the databases!
View Download Modified Entries Description
CEF.html CEF.bib Mar 11 2014 10:57:08 3 Cybersecurity Experimentation of the Future papers
ais.html ais.bib Feb 11 2011 14:46:10 2 Artificial Immune Systems (AIS), mostly related to computer security
bio-security.html bio-security.bib Feb 11 2011 14:46:10 3 Biologically inspired cyber security
bioinformatics.html bioinformatics.bib Feb 11 2011 14:46:10 10 Bioinformatics related stuff
bios.html bios.bib Feb 11 2011 14:46:10 6 Publications in bio sketches
ccs.html ccs.bib Feb 11 2011 14:46:10 19 Formal modeling in computer security and worm quarantine
coding.html coding.bib Feb 11 2011 14:46:10 13 Network coding, multicast, hypergraphs
complex.html complex.bib Aug 2 2011 10:42:14 26 Complex networks
crowds.html crowds.bib Nov 14 2011 15:06:42 3 crowdsourcing, programming contest, software innovation, games
damascas.html damascas.bib Jan 31 2013 10:44:31 13 Reading list for our HACMS/DAMASCAS project related to formal aspects of cyber-security in networked cyber physical systems. Applied to vehicular platforms.
defiance.html defiance.bib Aug 2 2011 10:57:03 7 Anti-censorship of Internet and TOR
diss.html diss.bib Aug 2 2011 10:44:05 74 Bibliography of my PhD thesis
economics.html economics.bib Feb 11 2011 14:46:10 20 Economics and specifically out-of-equilibrium, agent-based, etc. but also trust, reciprocity, and altruism
emist.html emist.bib Aug 2 2011 10:45:00 82 Worm and malicious code simulation/emulation and metrics
formal.html formal.bib Aug 2 2011 10:45:59 11 Formal methods, rewriting logic, temporal logic, Maude
frog.html frog.bib Aug 2 2011 10:47:09 11 Biological synchronization and strategies for self-organization
games.html games.bib Feb 11 2011 14:46:10 10 Game Theory
group.html group.bib Feb 11 2011 14:46:10 15 Group membership and communication
indoor.html indoor.bib Feb 11 2011 14:46:10 8 Indoor radio propagation
intrusion.html intrusion.bib Feb 11 2011 14:46:10 13 Intrusion Detection Systems (IDS) and more like prevention, response, cooperative, network- and host-based, etc.
irn.html irn.bib Feb 11 2011 14:46:10 26 Inherently Resilient Networks (IRN): Highly Optimized Tolerance (HOT), computer epidemic models, random and scale-free graphs
linda.html linda.bib Jan 10 2012 12:49:58 22 My own publications
manet.html manet.bib Sep 29 2011 12:25:57 5 Mobile Ad Hoc Networks
mnp.html mnp.bib Feb 11 2011 14:46:10 4 DARPA's Military Networking Protocol program
nescor.html nescor.bib Mar 11 2014 08:02:02 31 References about data and security event log normalization in the context of an integrated security operations center of an electric power utility.
ns2.html ns2.bib Feb 11 2011 14:46:10 2 Network Simulator 2 related references
op_sec.html op_sec.bib Feb 11 2011 14:46:10 7 Measuring and quantifying operational security (especially in distributed systems)
p2p.html p2p.bib Feb 11 2011 14:46:10 46 Peer-to-peer computing and networking
promise.html promise.bib Sep 21 2011 10:11:10 36 Failure propagation analysis for PROMISE project.
pvs.html pvs.bib Feb 11 2011 14:46:10 6 PVS theorem prover
robots.html robots.bib Feb 11 2011 14:46:10 10 100 indoor robots
security.html security.bib Feb 11 2011 14:46:10 38 Security in wireless, mobile networks
sensor.html sensor.bib Feb 11 2011 14:46:10 20 Sensor networks
softcomp.html softcomp.bib Feb 11 2011 14:46:10 2 Soft computing, fuzzy logic, soft-state
statistics.html statistics.bib Feb 11 2011 14:46:10 3 pseudo random number generators and confidence intervals
tbrpf.html tbrpf.bib Feb 11 2011 14:46:10 9 Topology Broadcast based on Reverse Path Forwarding routing protocol
trust_boot.html trust_boot.bib Feb 11 2011 14:46:10 12 Trust bootstrapping and establishment in wireless networks
usable.html usable.bib Aug 1 2011 11:35:07 40 Evaluating and measuring usability of computer security techniques
vernier-nta.html vernier-nta.bib Aug 2 2011 10:55:38 22 VERNIER Network Traffic Analysis related to collaborative malware detection and response
vernier.html vernier.bib Aug 2 2011 10:56:13 9 Application Communities and VERNIER project
voip.html voip.bib Apr 22 2013 12:55:15 17 VoIP traffic measurements
wireless.html wireless.bib Feb 11 2011 14:46:10 4 Wireless communication and networks
worms.html worms.bib Aug 2 2011 10:56:45 10 References to security advisories online (specific worms etc.)
wpes2012.html wpes2012.bib Jul 5 2012 09:39:19 25 IMC 2012 short paper references

This file was generated on Tue Apr 8 10:41:45 CDT 2014