The SCEAS System
Navigation Menu

Search the dblp DataBase


Mauricio Papa: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi
    Security Policy Coordination for Heterogeneous Information Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:219-228 [Conf]
  2. John Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi
    Extending Java for Package based Access Control. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:67-76 [Conf]
  3. Clinton Campbell, Jerald Dawkins, Brandon Pollet, Kenneth Fitch, John Hale, Mauricio Papa
    On Modeling Computer Networks for Vulnerability Analysis. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:233-244 [Conf]
  4. M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi
    An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:385-388 [Conf]
  5. John Hale, Mauricio Papa, Sujeet Shenoi
    Programmable Security for Object-Oriented Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:109-123 [Conf]
  6. Stephen Magill, Bradley Skaggs, Mauricio Papa, John Hale
    Implementation and Verification of Programmable Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:285-299 [Conf]
  7. Mauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi
    Simulation and Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:89-100 [Conf]
  8. Aly El-Semary, Janica Edmonds, Jesús González, Mauricio Papa
    Implementation of a Hybrid Intrusion Detection System Using Fuzzyjess. [Citation Graph (0, 0)][DBLP]
    ICEIS (2), 2005, pp:390-393 [Conf]
  9. Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi
    Formal Analysis of E-Commerce Protocols. [Citation Graph (0, 0)][DBLP]
    ISADS, 2001, pp:19-28 [Conf]
  10. Janica Edmonds, Mauricio Papa
    Cryptographic Protocol Analysis using Goal Extraction. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:75-80 [Conf]
  11. Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi
    Integrating Logics and Process Calculi for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:349-360 [Conf]
  12. Mauricio Papa, Jason Wood, Sujeet Shenoi
    Evaluating controller robustness using cell mapping. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2001, v:121, n:1, pp:3-12 [Journal]
  13. John Hale, Mauricio Papa, Sujeet Shenoi
    Programmable Access Control. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:3, pp:331-352 [Journal]
  14. Jerald Dawkins, K. Clark, G. Manes, Mauricio Papa
    A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2005, v:13, n:3, pp:253-267 [Journal]

  15. An Architecture for SCADA Network Forensics. [Citation Graph (, )][DBLP]

  16. Security Analysis of Multilayer SCADA Protocols. [Citation Graph (, )][DBLP]

  17. Passive Scanning in Modbus Networks. [Citation Graph (, )][DBLP]

  18. Security Strategies for SCADA Networks. [Citation Graph (, )][DBLP]

Search in 0.044secs, Finished in 0.045secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002