| View | Download | Modified | Entries | Description |
|---|---|---|---|---|
| CEF.html | CEF.bib | Mar 11 2014 10:57:08 | 3 | Cybersecurity Experimentation of the Future papers |
| ais.html | ais.bib | Feb 11 2011 14:46:10 | 2 | Artificial Immune Systems (AIS), mostly related to computer security |
| bio-security.html | bio-security.bib | Feb 11 2011 14:46:10 | 3 | Biologically inspired cyber security |
| bioinformatics.html | bioinformatics.bib | Feb 11 2011 14:46:10 | 10 | Bioinformatics related stuff |
| bios.html | bios.bib | Feb 11 2011 14:46:10 | 6 | Publications in bio sketches |
| ccs.html | ccs.bib | Feb 11 2011 14:46:10 | 19 | Formal modeling in computer security and worm quarantine |
| coding.html | coding.bib | Feb 11 2011 14:46:10 | 13 | Network coding, multicast, hypergraphs |
| complex.html | complex.bib | Aug 2 2011 10:42:14 | 26 | Complex networks |
| crowds.html | crowds.bib | Nov 14 2011 15:06:42 | 3 | crowdsourcing, programming contest, software innovation, games |
| damascas.html | damascas.bib | Jan 31 2013 10:44:31 | 13 | Reading list for our HACMS/DAMASCAS project related to formal aspects of cyber-security in networked cyber physical systems. Applied to vehicular platforms. |
| defiance.html | defiance.bib | Aug 2 2011 10:57:03 | 7 | Anti-censorship of Internet and TOR |
| diss.html | diss.bib | Aug 2 2011 10:44:05 | 74 | Bibliography of my PhD thesis |
| economics.html | economics.bib | Feb 11 2011 14:46:10 | 20 | Economics and specifically out-of-equilibrium, agent-based, etc. but also trust, reciprocity, and altruism |
| emist.html | emist.bib | Aug 2 2011 10:45:00 | 82 | Worm and malicious code simulation/emulation and metrics |
| formal.html | formal.bib | Aug 2 2011 10:45:59 | 11 | Formal methods, rewriting logic, temporal logic, Maude |
| frog.html | frog.bib | Aug 2 2011 10:47:09 | 11 | Biological synchronization and strategies for self-organization |
| games.html | games.bib | Feb 11 2011 14:46:10 | 10 | Game Theory |
| group.html | group.bib | Feb 11 2011 14:46:10 | 15 | Group membership and communication |
| indoor.html | indoor.bib | Feb 11 2011 14:46:10 | 8 | Indoor radio propagation |
| intrusion.html | intrusion.bib | Feb 11 2011 14:46:10 | 13 | Intrusion Detection Systems (IDS) and more like prevention, response, cooperative, network- and host-based, etc. |
| irn.html | irn.bib | Feb 11 2011 14:46:10 | 26 | Inherently Resilient Networks (IRN): Highly Optimized Tolerance (HOT), computer epidemic models, random and scale-free graphs |
| linda.html | linda.bib | Jan 10 2012 12:49:58 | 22 | My own publications |
| manet.html | manet.bib | Sep 29 2011 12:25:57 | 5 | Mobile Ad Hoc Networks |
| mnp.html | mnp.bib | Feb 11 2011 14:46:10 | 4 | DARPA's Military Networking Protocol program |
| nescor.html | nescor.bib | Mar 11 2014 08:02:02 | 31 | References about data and security event log normalization in the context of an integrated security operations center of an electric power utility. |
| ns2.html | ns2.bib | Feb 11 2011 14:46:10 | 2 | Network Simulator 2 related references |
| op_sec.html | op_sec.bib | Feb 11 2011 14:46:10 | 7 | Measuring and quantifying operational security (especially in distributed systems) |
| p2p.html | p2p.bib | Feb 11 2011 14:46:10 | 46 | Peer-to-peer computing and networking |
| promise.html | promise.bib | Sep 21 2011 10:11:10 | 36 | Failure propagation analysis for PROMISE project. |
| pvs.html | pvs.bib | Feb 11 2011 14:46:10 | 6 | PVS theorem prover |
| robots.html | robots.bib | Feb 11 2011 14:46:10 | 10 | 100 indoor robots |
| security.html | security.bib | Feb 11 2011 14:46:10 | 38 | Security in wireless, mobile networks |
| sensor.html | sensor.bib | Feb 11 2011 14:46:10 | 20 | Sensor networks |
| softcomp.html | softcomp.bib | Feb 11 2011 14:46:10 | 2 | Soft computing, fuzzy logic, soft-state |
| statistics.html | statistics.bib | Feb 11 2011 14:46:10 | 3 | pseudo random number generators and confidence intervals |
| tbrpf.html | tbrpf.bib | Feb 11 2011 14:46:10 | 9 | Topology Broadcast based on Reverse Path Forwarding routing protocol |
| trust_boot.html | trust_boot.bib | Feb 11 2011 14:46:10 | 12 | Trust bootstrapping and establishment in wireless networks |
| usable.html | usable.bib | Aug 1 2011 11:35:07 | 40 | Evaluating and measuring usability of computer security techniques |
| vernier-nta.html | vernier-nta.bib | Aug 2 2011 10:55:38 | 22 | VERNIER Network Traffic Analysis related to collaborative malware detection and response |
| vernier.html | vernier.bib | Aug 2 2011 10:56:13 | 9 | Application Communities and VERNIER project |
| voip.html | voip.bib | Apr 22 2013 12:55:15 | 17 | VoIP traffic measurements |
| wireless.html | wireless.bib | Feb 11 2011 14:46:10 | 4 | Wireless communication and networks |
| worms.html | worms.bib | Aug 2 2011 10:56:45 | 10 | References to security advisories online (specific worms etc.) |
| wpes2012.html | wpes2012.bib | Jul 5 2012 09:39:19 | 25 | IMC 2012 short paper references |