|
Search the dblp DataBase
Alvaro A. Cárdenas:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Alvaro A. Cárdenas, John S. Baras
B-ROC Curves for the Assessment of Classifiers over Imbalanced Data Sets. [Citation Graph (0, 0)][DBLP] AAAI, 2006, pp:- [Conf]
- Alvaro A. Cárdenas, Svetlana Radosavac, John S. Baras
Detection and prevention of MAC layer misbehavior in ad hoc networks. [Citation Graph (0, 0)][DBLP] SASN, 2004, pp:17-22 [Conf]
- Alvaro A. Cárdenas, John S. Baras, Karl Seamon
A Framework for the Evaluation of Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:63-77 [Conf]
- Svetlana Radosavac, Alvaro A. Cárdenas, John S. Baras, George V. Moustakides
Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2007, v:15, n:1, pp:103-128 [Journal]
- Alvaro A. Cárdenas, Svetlana Radosavac, John S. Baras
Performance Comparison of Detection Schemes for MAC Layer Misbehavior. [Citation Graph (0, 0)][DBLP] INFOCOM, 2007, pp:1496-1504 [Conf]
- Alvaro A. Cárdenas, George V. Moustakides, John S. Baras
Towards Optimal Design of Data Hiding Algorithms Against Nonparametric Adversary Models. [Citation Graph (0, 0)][DBLP] CISS, 2007, pp:911-916 [Conf]
Principled reasoning and practical applications of alert fusion in intrusion detection systems. [Citation Graph (, )][DBLP]
Towards a secure and interoperable DRM architecture. [Citation Graph (, )][DBLP]
Safe and Secure Networked Control Systems under Denial-of-Service Attacks. [Citation Graph (, )][DBLP]
Secure Control: Towards Survivable Cyber-Physical Systems. [Citation Graph (, )][DBLP]
On Optimal Watermarking Schemes in Uncertain Gaussian Channels. [Citation Graph (, )][DBLP]
Optimal ROC Curve for a Combination of Classifiers. [Citation Graph (, )][DBLP]
Nudge: intermediaries' role in interdependent network security. [Citation Graph (, )][DBLP]
Research Challenges for the Security of Control Systems. [Citation Graph (, )][DBLP]
Nudge: Intermediaries' Role in Interdependent Network Security. [Citation Graph (, )][DBLP]
Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|