| 2008 |
| 19 | EE | Tim Kilpatrick,
Jesús González,
Rodrigo Chandia,
Mauricio Papa,
Sujeet Shenoi:
Forensic analysis of SCADA systems and networks.
IJSN 3(2): 95-102 (2008) |
| 2007 |
| 18 | EE | Rodrigo Chandia,
Jesús González,
Tim Kilpatrick,
Mauricio Papa,
Sujeet Shenoi:
Security Strategies for SCADA Networks.
Critical Infrastructure Protection 2007: 117-131 |
| 17 | EE | Jesús González,
Mauricio Papa:
Passive Scanning in Modbus Networks.
Critical Infrastructure Protection 2007: 175-187 |
| 16 | EE | Janica Edmonds,
Mauricio Papa,
Sujeet Shenoi:
Security Analysis of Multilayer SCADA Protocols.
Critical Infrastructure Protection 2007: 205-221 |
| 2006 |
| 15 | | Tim Kilpatrick,
Jesús González,
Rodrigo Chandia,
Mauricio Papa,
Sujeet Shenoi:
An Architecture for SCADA Network Forensics.
IFIP Int. Conf. Digital Forensics 2006: 273-285 |
| 2005 |
| 14 | | Aly El-Semary,
Janica Edmonds,
Jesús González,
Mauricio Papa:
Implementation of a Hybrid Intrusion Detection System Using Fuzzyjess.
ICEIS (2) 2005: 390-393 |
| 13 | EE | Jerald Dawkins,
K. Clark,
G. Manes,
Mauricio Papa:
A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks.
J. Network Syst. Manage. 13(3): 253-267 (2005) |
| 2004 |
| 12 | EE | Janica Edmonds,
Mauricio Papa:
Cryptographic Protocol Analysis using Goal Extraction.
ITCC (1) 2004: 75-80 |
| 2003 |
| 11 | | Mauricio Papa,
Oliver Bremer,
John Hale,
Sujeet Shenoi:
Integrating Logics and Process Calculi for Cryptographic Protocol Analysis.
SEC 2003: 349-360 |
| 10 | | John Hale,
Mauricio Papa,
Sujeet Shenoi:
Programmable Access Control.
Journal of Computer Security 11(3): 331-352 (2003) |
| 2002 |
| 9 | | Clinton Campbell,
Jerald Dawkins,
Brandon Pollet,
Kenneth Fitch,
John Hale,
Mauricio Papa:
On Modeling Computer Networks for Vulnerability Analysis.
DBSec 2002: 233-244 |
| 8 | | Stephen Magill,
Bradley Skaggs,
Mauricio Papa,
John Hale:
Implementation and Verification of Programmable Security.
DBSec 2002: 285-299 |
| 2001 |
| 7 | EE | Mauricio Papa,
Oliver Bremer,
John Hale,
Sujeet Shenoi:
Formal Analysis of E-Commerce Protocols.
ISADS 2001: 19-28 |
| 6 | EE | Mauricio Papa,
Jason Wood,
Sujeet Shenoi:
Evaluating controller robustness using cell mapping.
Fuzzy Sets and Systems 121(1): 3-12 (2001) |
| 2000 |
| 5 | EE | John Hale,
Mauricio Papa,
Oliver Bremer,
Rodrigo Chandia,
Sujeet Shenoi:
Extending Java for Package based Access Control.
ACSAC 2000: 67-76 |
| 4 | | Mauricio Papa,
Oliver Bremer,
Stephen Magill,
John Hale,
Sujeet Shenoi:
Simulation and Analysis of Cryptographic Protocols.
DBSec 2000: 89-100 |
| 1999 |
| 3 | EE | John Hale,
Pablo Galiasso,
Mauricio Papa,
Sujeet Shenoi:
Security Policy Coordination for Heterogeneous Information Systems.
ACSAC 1999: 219-228 |
| 1998 |
| 2 | | John Hale,
Mauricio Papa,
Sujeet Shenoi:
Programmable Security for Object-Oriented Systems.
DBSec 1998: 109-123 |
| 1997 |
| 1 | | M. Berryman,
C. Rummel,
Mauricio Papa,
John Hale,
Jody Threet,
Sujeet Shenoi:
An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects.
DBSec 1997: 385-388 |