The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Marcelo Masera: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Philip Morris, Marcelo Masera, Marc Wilikens
    Requirements Engineering and Industrial Uptake. [Citation Graph (0, 0)][DBLP]
    ICRE, 1998, pp:130-137 [Conf]
  2. Philip Morris, Marcelo Masera, Marc Wilikens
    Industrial Workshop on Requirements for R&D in Requirements Engineering. [Citation Graph (0, 0)][DBLP]
    RE, 1997, pp:41- [Conf]
  3. Marc Wilikens, Simone Feriti, Alberto Sanna, Marcelo Masera
    A context-related authorization and access control method based on RBAC. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:117-124 [Conf]
  4. Igor Nai Fovino, Marcelo Masera
    Through the Description of Attacks: A Multidimensional View. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2006, pp:15-28 [Conf]
  5. Sara Jones, Marc Wilikens, Philip Morris, Marcelo Masera
    Trust requirements in e-business. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:81-87 [Journal]
  6. Robin E. Bloomfield, Marcelo Masera, Ann Miller, O. Sami Saydjari, Charles B. Weinstock
    Assurance Cases for Security: The Metrics Challenge. [Citation Graph (0, 0)][DBLP]
    DSN, 2007, pp:807-808 [Conf]

  7. Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests. [Citation Graph (, )][DBLP]


  8. Modbus/DNP3 State-Based Intrusion Detection System. [Citation Graph (, )][DBLP]


  9. Scada Malware, a Proof of Concept. [Citation Graph (, )][DBLP]


  10. Design of a Platform for Information Exchange on Protection of Critical Infrastructures. [Citation Graph (, )][DBLP]


  11. Assessment of Structural Vulnerability for Power Grids by Network Performance Based on Complex Networks. [Citation Graph (, )][DBLP]


  12. State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept. [Citation Graph (, )][DBLP]


  13. A Service-Oriented Approach for Assessing Infrastructure Security. [Citation Graph (, )][DBLP]


  14. Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests. [Citation Graph (, )][DBLP]


  15. MAISim: mobile agent malware simulator. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002