View |
Download |
Modified |
Entries |
Description |
CEF.html | CEF.bib |
Mar 11 2014 10:57:08
|
3
|
Cybersecurity Experimentation of the Future papers
|
ais.html | ais.bib |
Feb 11 2011 14:46:10
|
2
|
Artificial Immune Systems (AIS), mostly related to computer security
|
bio-security.html | bio-security.bib |
Feb 11 2011 14:46:10
|
3
|
Biologically inspired cyber security
|
bioinformatics.html | bioinformatics.bib |
Feb 11 2011 14:46:10
|
10
|
Bioinformatics related stuff
|
bios.html | bios.bib |
Feb 11 2011 14:46:10
|
6
|
Publications in bio sketches |
ccs.html | ccs.bib |
Feb 11 2011 14:46:10
|
19
|
Formal modeling in computer security and worm quarantine
|
coding.html | coding.bib |
Feb 11 2011 14:46:10
|
13
|
Network coding, multicast, hypergraphs
|
complex.html | complex.bib |
Aug 2 2011 10:42:14
|
26
|
Complex networks |
crowds.html | crowds.bib |
Nov 14 2011 15:06:42
|
3
|
crowdsourcing, programming contest, software innovation, games
|
damascas.html | damascas.bib |
Jan 31 2013 10:44:31
|
13
|
Reading list for our HACMS/DAMASCAS project related to formal aspects of cyber-security in networked cyber physical systems. Applied to vehicular platforms.
|
defiance.html | defiance.bib |
Aug 2 2011 10:57:03
|
7
|
Anti-censorship of Internet and TOR
|
diss.html | diss.bib |
Aug 2 2011 10:44:05
|
74
|
Bibliography of my PhD thesis |
economics.html | economics.bib |
Feb 11 2011 14:46:10
|
20
|
Economics and specifically out-of-equilibrium, agent-based, etc. but also trust, reciprocity, and altruism
|
emist.html | emist.bib |
Aug 2 2011 10:45:00
|
82
|
Worm and malicious code simulation/emulation and metrics
|
formal.html | formal.bib |
Aug 2 2011 10:45:59
|
11
|
Formal methods, rewriting logic, temporal logic, Maude
|
frog.html | frog.bib |
Aug 2 2011 10:47:09
|
11
|
Biological synchronization and strategies for self-organization |
games.html | games.bib |
Feb 11 2011 14:46:10
|
10
|
Game Theory |
group.html | group.bib |
Feb 11 2011 14:46:10
|
15
|
Group membership and communication |
indoor.html | indoor.bib |
Feb 11 2011 14:46:10
|
8
|
Indoor radio propagation |
intrusion.html | intrusion.bib |
Feb 11 2011 14:46:10
|
13
|
Intrusion Detection Systems (IDS) and more like prevention, response, cooperative, network- and host-based, etc. |
irn.html | irn.bib |
Feb 11 2011 14:46:10
|
26
|
Inherently Resilient Networks (IRN): Highly Optimized Tolerance (HOT), computer epidemic models, random and scale-free graphs
|
linda.html | linda.bib |
Jan 10 2012 12:49:58
|
22
|
My own publications |
manet.html | manet.bib |
Sep 29 2011 12:25:57
|
5
|
Mobile Ad Hoc Networks |
mnp.html | mnp.bib |
Feb 11 2011 14:46:10
|
4
|
DARPA's Military Networking Protocol program
|
nescor.html | nescor.bib |
Mar 11 2014 08:02:02
|
31
|
References about data and security event log normalization in the context of an integrated security operations center of an electric power utility.
|
ns2.html | ns2.bib |
Feb 11 2011 14:46:10
|
2
|
Network Simulator 2 related references
|
op_sec.html | op_sec.bib |
Feb 11 2011 14:46:10
|
7
|
Measuring and quantifying operational security (especially in distributed systems) |
p2p.html | p2p.bib |
Feb 11 2011 14:46:10
|
46
|
Peer-to-peer computing and networking |
promise.html | promise.bib |
Sep 21 2011 10:11:10
|
36
|
Failure propagation analysis for PROMISE project.
|
pvs.html | pvs.bib |
Feb 11 2011 14:46:10
|
6
|
PVS theorem prover |
robots.html | robots.bib |
Feb 11 2011 14:46:10
|
10
|
100 indoor robots
|
security.html | security.bib |
Feb 11 2011 14:46:10
|
38
|
Security in wireless, mobile networks |
sensor.html | sensor.bib |
Feb 11 2011 14:46:10
|
20
|
Sensor networks |
softcomp.html | softcomp.bib |
Feb 11 2011 14:46:10
|
2
|
Soft computing, fuzzy logic, soft-state |
statistics.html | statistics.bib |
Feb 11 2011 14:46:10
|
3
|
pseudo random number generators and confidence intervals
|
tbrpf.html | tbrpf.bib |
Feb 11 2011 14:46:10
|
9
|
Topology Broadcast based on Reverse Path Forwarding routing protocol |
trust_boot.html | trust_boot.bib |
Feb 11 2011 14:46:10
|
12
|
Trust bootstrapping and establishment in wireless networks |
usable.html | usable.bib |
Aug 1 2011 11:35:07
|
40
|
Evaluating and measuring usability of computer security techniques
|
vernier-nta.html | vernier-nta.bib |
Aug 2 2011 10:55:38
|
22
|
VERNIER Network Traffic Analysis related to collaborative malware detection and response
|
vernier.html | vernier.bib |
Aug 2 2011 10:56:13
|
9
|
Application Communities and VERNIER project
|
voip.html | voip.bib |
Apr 22 2013 12:55:15
|
17
|
VoIP traffic measurements
|
wireless.html | wireless.bib |
Feb 11 2011 14:46:10
|
4
|
Wireless communication and networks |
worms.html | worms.bib |
Aug 2 2011 10:56:45
|
10
|
References to security advisories online (specific worms etc.)
|
wpes2012.html | wpes2012.bib |
Jul 5 2012 09:39:19
|
25
|
IMC 2012 short paper references
|