dblp.uni-trier.dewww.uni-trier.de

Mauricio Papa

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
19EETim Kilpatrick, Jesús González, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi: Forensic analysis of SCADA systems and networks. IJSN 3(2): 95-102 (2008)
2007
18EERodrigo Chandia, Jesús González, Tim Kilpatrick, Mauricio Papa, Sujeet Shenoi: Security Strategies for SCADA Networks. Critical Infrastructure Protection 2007: 117-131
17EEJesús González, Mauricio Papa: Passive Scanning in Modbus Networks. Critical Infrastructure Protection 2007: 175-187
16EEJanica Edmonds, Mauricio Papa, Sujeet Shenoi: Security Analysis of Multilayer SCADA Protocols. Critical Infrastructure Protection 2007: 205-221
2006
15 Tim Kilpatrick, Jesús González, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi: An Architecture for SCADA Network Forensics. IFIP Int. Conf. Digital Forensics 2006: 273-285
2005
14 Aly El-Semary, Janica Edmonds, Jesús González, Mauricio Papa: Implementation of a Hybrid Intrusion Detection System Using Fuzzyjess. ICEIS (2) 2005: 390-393
13EEJerald Dawkins, K. Clark, G. Manes, Mauricio Papa: A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks. J. Network Syst. Manage. 13(3): 253-267 (2005)
2004
12EEJanica Edmonds, Mauricio Papa: Cryptographic Protocol Analysis using Goal Extraction. ITCC (1) 2004: 75-80
2003
11 Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi: Integrating Logics and Process Calculi for Cryptographic Protocol Analysis. SEC 2003: 349-360
10 John Hale, Mauricio Papa, Sujeet Shenoi: Programmable Access Control. Journal of Computer Security 11(3): 331-352 (2003)
2002
9 Clinton Campbell, Jerald Dawkins, Brandon Pollet, Kenneth Fitch, John Hale, Mauricio Papa: On Modeling Computer Networks for Vulnerability Analysis. DBSec 2002: 233-244
8 Stephen Magill, Bradley Skaggs, Mauricio Papa, John Hale: Implementation and Verification of Programmable Security. DBSec 2002: 285-299
2001
7EEMauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi: Formal Analysis of E-Commerce Protocols. ISADS 2001: 19-28
6EEMauricio Papa, Jason Wood, Sujeet Shenoi: Evaluating controller robustness using cell mapping. Fuzzy Sets and Systems 121(1): 3-12 (2001)
2000
5EEJohn Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi: Extending Java for Package based Access Control. ACSAC 2000: 67-76
4 Mauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi: Simulation and Analysis of Cryptographic Protocols. DBSec 2000: 89-100
1999
3EEJohn Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi: Security Policy Coordination for Heterogeneous Information Systems. ACSAC 1999: 219-228
1998
2 John Hale, Mauricio Papa, Sujeet Shenoi: Programmable Security for Object-Oriented Systems. DBSec 1998: 109-123
1997
1 M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi: An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. DBSec 1997: 385-388

Coauthor Index

1M. Berryman [1]
2Oliver Bremer [4] [5] [7] [11]
3Clinton Campbell [9]
4Rodrigo Chandia [5] [15] [18] [19]
5K. Clark [13]
6Jerald Dawkins [9] [13]
7Janica Edmonds [12] [14] [16]
8Aly El-Semary [14]
9Kenneth Fitch [9]
10Pablo Galiasso [3]
11Jesús González [14] [15] [17] [18] [19]
12John Hale [1] [2] [3] [4] [5] [7] [8] [9] [10] [11]
13Tim Kilpatrick [15] [18] [19]
14Stephen Magill [4] [8]
15G. Manes [13]
16Brandon Pollet [9]
17C. Rummel [1]
18Sujeet Shenoi [1] [2] [3] [4] [5] [6] [7] [10] [11] [15] [16] [18] [19]
19Bradley Skaggs [8]
20Jody Threet [1]
21Jason Wood [6]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)