|
Search the dblp DataBase
Mauricio Papa:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- John Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi
Security Policy Coordination for Heterogeneous Information Systems. [Citation Graph (0, 0)][DBLP] ACSAC, 1999, pp:219-228 [Conf]
- John Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi
Extending Java for Package based Access Control. [Citation Graph (0, 0)][DBLP] ACSAC, 2000, pp:67-76 [Conf]
- Clinton Campbell, Jerald Dawkins, Brandon Pollet, Kenneth Fitch, John Hale, Mauricio Papa
On Modeling Computer Networks for Vulnerability Analysis. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:233-244 [Conf]
- M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi
An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. [Citation Graph (0, 0)][DBLP] DBSec, 1997, pp:385-388 [Conf]
- John Hale, Mauricio Papa, Sujeet Shenoi
Programmable Security for Object-Oriented Systems. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:109-123 [Conf]
- Stephen Magill, Bradley Skaggs, Mauricio Papa, John Hale
Implementation and Verification of Programmable Security. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:285-299 [Conf]
- Mauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi
Simulation and Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] DBSec, 2000, pp:89-100 [Conf]
- Aly El-Semary, Janica Edmonds, Jesús González, Mauricio Papa
Implementation of a Hybrid Intrusion Detection System Using Fuzzyjess. [Citation Graph (0, 0)][DBLP] ICEIS (2), 2005, pp:390-393 [Conf]
- Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi
Formal Analysis of E-Commerce Protocols. [Citation Graph (0, 0)][DBLP] ISADS, 2001, pp:19-28 [Conf]
- Janica Edmonds, Mauricio Papa
Cryptographic Protocol Analysis using Goal Extraction. [Citation Graph (0, 0)][DBLP] ITCC (1), 2004, pp:75-80 [Conf]
- Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi
Integrating Logics and Process Calculi for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:349-360 [Conf]
- Mauricio Papa, Jason Wood, Sujeet Shenoi
Evaluating controller robustness using cell mapping. [Citation Graph (0, 0)][DBLP] Fuzzy Sets and Systems, 2001, v:121, n:1, pp:3-12 [Journal]
- John Hale, Mauricio Papa, Sujeet Shenoi
Programmable Access Control. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2003, v:11, n:3, pp:331-352 [Journal]
- Jerald Dawkins, K. Clark, G. Manes, Mauricio Papa
A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks. [Citation Graph (0, 0)][DBLP] J. Network Syst. Manage., 2005, v:13, n:3, pp:253-267 [Journal]
An Architecture for SCADA Network Forensics. [Citation Graph (, )][DBLP]
Security Analysis of Multilayer SCADA Protocols. [Citation Graph (, )][DBLP]
Passive Scanning in Modbus Networks. [Citation Graph (, )][DBLP]
Security Strategies for SCADA Networks. [Citation Graph (, )][DBLP]
Search in 0.044secs, Finished in 0.045secs
|