The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Alvaro A. Cárdenas: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Alvaro A. Cárdenas, John S. Baras
    B-ROC Curves for the Assessment of Classifiers over Imbalanced Data Sets. [Citation Graph (0, 0)][DBLP]
    AAAI, 2006, pp:- [Conf]
  2. Alvaro A. Cárdenas, Svetlana Radosavac, John S. Baras
    Detection and prevention of MAC layer misbehavior in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:17-22 [Conf]
  3. Alvaro A. Cárdenas, John S. Baras, Karl Seamon
    A Framework for the Evaluation of Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:63-77 [Conf]
  4. Svetlana Radosavac, Alvaro A. Cárdenas, John S. Baras, George V. Moustakides
    Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2007, v:15, n:1, pp:103-128 [Journal]
  5. Alvaro A. Cárdenas, Svetlana Radosavac, John S. Baras
    Performance Comparison of Detection Schemes for MAC Layer Misbehavior. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:1496-1504 [Conf]
  6. Alvaro A. Cárdenas, George V. Moustakides, John S. Baras
    Towards Optimal Design of Data Hiding Algorithms Against Nonparametric Adversary Models. [Citation Graph (0, 0)][DBLP]
    CISS, 2007, pp:911-916 [Conf]

  7. Principled reasoning and practical applications of alert fusion in intrusion detection systems. [Citation Graph (, )][DBLP]


  8. Towards a secure and interoperable DRM architecture. [Citation Graph (, )][DBLP]


  9. Safe and Secure Networked Control Systems under Denial-of-Service Attacks. [Citation Graph (, )][DBLP]


  10. Secure Control: Towards Survivable Cyber-Physical Systems. [Citation Graph (, )][DBLP]


  11. On Optimal Watermarking Schemes in Uncertain Gaussian Channels. [Citation Graph (, )][DBLP]


  12. Optimal ROC Curve for a Combination of Classifiers. [Citation Graph (, )][DBLP]


  13. Nudge: intermediaries' role in interdependent network security. [Citation Graph (, )][DBLP]


  14. Research Challenges for the Security of Control Systems. [Citation Graph (, )][DBLP]


  15. Nudge: Intermediaries' Role in Interdependent Network Security. [Citation Graph (, )][DBLP]


  16. Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002