2008 |
19 | EE | Tim Kilpatrick,
Jesús González,
Rodrigo Chandia,
Mauricio Papa,
Sujeet Shenoi:
Forensic analysis of SCADA systems and networks.
IJSN 3(2): 95-102 (2008) |
2007 |
18 | EE | Rodrigo Chandia,
Jesús González,
Tim Kilpatrick,
Mauricio Papa,
Sujeet Shenoi:
Security Strategies for SCADA Networks.
Critical Infrastructure Protection 2007: 117-131 |
17 | EE | Jesús González,
Mauricio Papa:
Passive Scanning in Modbus Networks.
Critical Infrastructure Protection 2007: 175-187 |
16 | EE | Janica Edmonds,
Mauricio Papa,
Sujeet Shenoi:
Security Analysis of Multilayer SCADA Protocols.
Critical Infrastructure Protection 2007: 205-221 |
2006 |
15 | | Tim Kilpatrick,
Jesús González,
Rodrigo Chandia,
Mauricio Papa,
Sujeet Shenoi:
An Architecture for SCADA Network Forensics.
IFIP Int. Conf. Digital Forensics 2006: 273-285 |
2005 |
14 | | Aly El-Semary,
Janica Edmonds,
Jesús González,
Mauricio Papa:
Implementation of a Hybrid Intrusion Detection System Using Fuzzyjess.
ICEIS (2) 2005: 390-393 |
13 | EE | Jerald Dawkins,
K. Clark,
G. Manes,
Mauricio Papa:
A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks.
J. Network Syst. Manage. 13(3): 253-267 (2005) |
2004 |
12 | EE | Janica Edmonds,
Mauricio Papa:
Cryptographic Protocol Analysis using Goal Extraction.
ITCC (1) 2004: 75-80 |
2003 |
11 | | Mauricio Papa,
Oliver Bremer,
John Hale,
Sujeet Shenoi:
Integrating Logics and Process Calculi for Cryptographic Protocol Analysis.
SEC 2003: 349-360 |
10 | | John Hale,
Mauricio Papa,
Sujeet Shenoi:
Programmable Access Control.
Journal of Computer Security 11(3): 331-352 (2003) |
2002 |
9 | | Clinton Campbell,
Jerald Dawkins,
Brandon Pollet,
Kenneth Fitch,
John Hale,
Mauricio Papa:
On Modeling Computer Networks for Vulnerability Analysis.
DBSec 2002: 233-244 |
8 | | Stephen Magill,
Bradley Skaggs,
Mauricio Papa,
John Hale:
Implementation and Verification of Programmable Security.
DBSec 2002: 285-299 |
2001 |
7 | EE | Mauricio Papa,
Oliver Bremer,
John Hale,
Sujeet Shenoi:
Formal Analysis of E-Commerce Protocols.
ISADS 2001: 19-28 |
6 | EE | Mauricio Papa,
Jason Wood,
Sujeet Shenoi:
Evaluating controller robustness using cell mapping.
Fuzzy Sets and Systems 121(1): 3-12 (2001) |
2000 |
5 | EE | John Hale,
Mauricio Papa,
Oliver Bremer,
Rodrigo Chandia,
Sujeet Shenoi:
Extending Java for Package based Access Control.
ACSAC 2000: 67-76 |
4 | | Mauricio Papa,
Oliver Bremer,
Stephen Magill,
John Hale,
Sujeet Shenoi:
Simulation and Analysis of Cryptographic Protocols.
DBSec 2000: 89-100 |
1999 |
3 | EE | John Hale,
Pablo Galiasso,
Mauricio Papa,
Sujeet Shenoi:
Security Policy Coordination for Heterogeneous Information Systems.
ACSAC 1999: 219-228 |
1998 |
2 | | John Hale,
Mauricio Papa,
Sujeet Shenoi:
Programmable Security for Object-Oriented Systems.
DBSec 1998: 109-123 |
1997 |
1 | | M. Berryman,
C. Rummel,
Mauricio Papa,
John Hale,
Jody Threet,
Sujeet Shenoi:
An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects.
DBSec 1997: 385-388 |