default search action
Emil C. Lupu
Emil Constantine Lupu – Emil Lupu
Person information
- affiliation: Imperial College London, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j32]Luca Maria Castiglione, Emil C. Lupu:
Which Attacks Lead to Hazards? Combining Safety and Security Analysis for Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 21(4): 2526-2540 (2024) - [j31]Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu:
Hyperparameter Learning Under Data Poisoning: Analysis of the Influence of Regularization via Multiobjective Bilevel Optimization. IEEE Trans. Neural Networks Learn. Syst. 35(11): 16008-16022 (2024) - [i29]Dovydas Joksas, Luis Muñoz-González, Emil Lupu, Adnan Mehonic:
Nonideality-aware training makes memristive networks more robust to adversarial attacks. CoRR abs/2409.19671 (2024) - 2023
- [j30]Jukka Soikkeli, Giuliano Casale, Luis Muñoz-González, Emil C. Lupu:
Redundancy Planning for Cost Efficient Resilience to Cyber Attacks. IEEE Trans. Dependable Secur. Comput. 20(2): 1154-1168 (2023) - [j29]Fulvio Valenza, Erisa Karafili, Rodrigo Vieira Steiner, Emil C. Lupu:
A Hybrid Threat Model for Smart Systems. IEEE Trans. Dependable Secur. Comput. 20(5): 4403-4417 (2023) - [i28]Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu:
Hyperparameter Learning under Data Poisoning: Analysis of the Influence of Regularization via Multiobjective Bilevel Optimization. CoRR abs/2306.01613 (2023) - [i27]Rajib Ranjan Maiti, Sridhar Adepu, Emil Lupu:
ICCPS: Impact discovery using causal inference for cyber attacks in CPSs. CoRR abs/2307.14161 (2023) - [i26]Marwa Salayma, Emil C. Lupu:
Threat Modelling in Internet of Things (IoT) Environment Using Dynamic Attack Graphs. CoRR abs/2310.01689 (2023) - 2022
- [c124]Kenneth T. Co, David Martínez-Rego, Zhongyuan Hau, Emil C. Lupu:
Jacobian Ensembles Improve Robustness Trade-Offs to Adversarial Attacks. ICANN (3) 2022: 680-691 - [c123]Luca Maria Castiglione, Zhongyuan Hau, Pudong Ge, Kenneth T. Co, Luis Muñoz-González, Fei Teng, Emil Lupu:
HA-Grid: Security Aware Hazard Analysis for Smart Grids. SmartGridComm 2022: 446-452 - [c122]Zhongyuan Hau, Soteris Demetriou, Emil C. Lupu:
Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception. SP (Workshops) 2022: 229-235 - [i25]Kenneth T. Co, David Martínez-Rego, Zhongyuan Hau, Emil C. Lupu:
Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks. CoRR abs/2204.08726 (2022) - [i24]Zhongyuan Hau, Soteris Demetriou, Emil C. Lupu:
Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception. CoRR abs/2204.13973 (2022) - 2021
- [j28]Hassan Chizari, Emil Lupu:
Extracting Randomness from the Trend of IPI for Cryptographic Operations in Implantable Medical Devices. IEEE Trans. Dependable Secur. Comput. 18(2): 875-888 (2021) - [c121]Zhongyuan Hau, Soteris Demetriou, Luis Muñoz-González, Emil C. Lupu:
Shadow-Catcher: Looking into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing. ESORICS (1) 2021: 691-711 - [c120]Jukka Soikkeli, Cora Lisa Perner, Emil C. Lupu:
Analyzing the Viability of UAV Missions Facing Cyber Attacks. EuroS&P Workshops 2021: 103-112 - [c119]Kenneth T. Co, David Martínez-Rego, Emil C. Lupu:
Jacobian Regularization for Mitigating Universal Adversarial Perturbations. ICANN (4) 2021: 202-213 - [c118]Kenneth T. Co, Luis Muñoz-González, Leslie Kanthan, Ben Glocker, Emil C. Lupu:
Universal Adversarial Robustness of Texture and Shape-Biased Models. ICIP 2021: 799-803 - [i23]Zhongyuan Hau, Kenneth T. Co, Soteris Demetriou, Emil C. Lupu:
Object Removal Attacks on LiDAR-based 3D Object Detectors. CoRR abs/2102.03722 (2021) - [i22]Kenneth T. Co, David Martínez-Rego, Emil C. Lupu:
Jacobian Regularization for Mitigating Universal Adversarial Perturbations. CoRR abs/2104.10459 (2021) - [i21]Kenneth T. Co, Luis Muñoz-González, Leslie Kanthan, Emil C. Lupu:
Real-time Detection of Practical Universal Adversarial Perturbations. CoRR abs/2105.07334 (2021) - [i20]Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu:
Regularization Can Help Mitigate Poisoning Attacks... with the Right Hyperparameters. CoRR abs/2105.10948 (2021) - 2020
- [j27]Erisa Karafili, Linna Wang, Emil C. Lupu:
An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks. Digit. Investig. 32 Supplement: 300925 (2020) - [c117]Luca Maria Castiglione, Emil C. Lupu:
Hazard Driven Threat Modelling for Cyber Physical Systems. CPSIOTSEC@CCS 2020: 13-24 - [c116]Erisa Karafili, Fulvio Valenza, Yichen Chen, Emil C. Lupu:
Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning. NOMS 2020: 1-4 - [i19]Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu:
Regularisation Can Mitigate Poisoning Attacks: A Novel Analysis Based on Multiobjective Bilevel Optimisation. CoRR abs/2003.00040 (2020) - [i18]Zhongyuan Hau, Soteris Demetriou, Luis Muñoz-González, Emil C. Lupu:
GhostBuster: Looking Into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing. CoRR abs/2008.12008 (2020) - [i17]Alberto G. Matachana, Kenneth T. Co, Luis Muñoz-González, David Martínez-Rego, Emil C. Lupu:
Robustness and Transferability of Universal Attacks on Compressed Models. CoRR abs/2012.06024 (2020)
2010 – 2019
- 2019
- [j26]Rodrigo Vieira Steiner, Emil Lupu:
Towards more practical software-based attestation. Comput. Networks 149: 43-55 (2019) - [j25]Konstantina Spanaki, Zeynep Gürgüç, Catherine Mulligan, Emil Lupu:
Organizational cloud security and control: a proactive approach. Inf. Technol. People 32(3): 516-537 (2019) - [j24]Luis Munoz-Gonzalez, Daniele Sgandurra, Martín Barrère, Emil C. Lupu:
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs. IEEE Trans. Dependable Secur. Comput. 16(2): 231-244 (2019) - [c115]Jukka Soikkeli, Luis Muñoz-González, Emil Lupu:
Efficient Attack Countermeasure Selection Accounting for Recovery and Action Costs. ARES 2019: 3:1-3:10 - [c114]Kenneth T. Co, Luis Muñoz-González, Sixte de Maupeou, Emil C. Lupu:
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks. CCS 2019: 275-289 - [c113]Zhongyuan Hau, Emil C. Lupu:
Exploiting Correlations to Detect False Data Injections in Low-Density Wireless Sensor Networks. CPSS@AsiaCCS 2019: 1-12 - [c112]Greg Collinge, Emil C. Lupu, Luis Muñoz-González:
Defending against poisoning attacks in online learning settings. ESANN 2019 - [i16]Jukka Soikkeli, Luis Muñoz-González, Emil C. Lupu:
Efficient attack countermeasure selection accounting for recovery and action costs. CoRR abs/1904.03082 (2019) - [i15]Erisa Karafili, Linna Wang, Emil C. Lupu:
An Argumentation-Based Approach to Assist in the Investigation and Attribution of Cyber-Attacks. CoRR abs/1904.13173 (2019) - [i14]Kenneth T. Co, Luis Muñoz-González, Emil C. Lupu:
Sensitivity of Deep Convolutional Networks to Gabor Noise. CoRR abs/1906.03455 (2019) - [i13]Luis Muñoz-González, Bjarne Pfitzner, Matteo Russo, Javier Carnerero-Cano, Emil C. Lupu:
Poisoning Attacks with Generative Adversarial Nets. CoRR abs/1906.07773 (2019) - [i12]Luis Muñoz-González, Kenneth T. Co, Emil C. Lupu:
Byzantine-Robust Federated Machine Learning through Adaptive Model Averaging. CoRR abs/1909.05125 (2019) - [i11]Kenneth T. Co, Luis Muñoz-González, Leslie Kanthan, Ben Glocker, Emil C. Lupu:
Universal Adversarial Perturbations to Understand Robustness of Texture vs. Shape-biased Training. CoRR abs/1911.10364 (2019) - 2018
- [j23]Erisa Karafili, Konstantina Spanaki, Emil C. Lupu:
An argumentation reasoning approach for data processing. Comput. Ind. 94: 52-61 (2018) - [j22]Awais Rashid, George Danezis, Howard Chivers, Emil Lupu, Andrew Martin, Makayla Lewis, Claudia Peersman:
Scoping the Cyber Security Body of Knowledge. IEEE Secur. Priv. 16(3): 96-102 (2018) - [j21]Vittorio P. Illiano, Andrea Paudice, Luis Muñoz-González, Emil C. Lupu:
Determining Resilience Gains From Anomaly Detection for Event Integrity in Wireless Sensor Networks. ACM Trans. Sens. Networks 14(1): 5:1-5:35 (2018) - [c111]Erisa Karafili, Konstantina Spanaki, Emil C. Lupu:
Access Control and Quality Attributes of Open Data: Applications and Techniques. BIS (Workshops) 2018: 603-614 - [c110]Alan Cullen, Erisa Karafili, Alan Pilgrim, Christopher Williams, Emil Lupu:
Policy Support for Autonomous Swarms of Drones. ETAA@ESORICS 2018: 56-70 - [c109]Erisa Karafili, Daniele Sgandurra, Emil Lupu:
A Logic-Based Reasoner for Discovering Authentication Vulnerabilities Between Interconnected Accounts. ETAA@ESORICS 2018: 73-87 - [c108]Andrea Paudice, Luis Muñoz-González, Emil C. Lupu:
Label Sanitization Against Label Flipping Poisoning Attacks. Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML 2018: 5-15 - [c107]Erisa Karafili, Linna Wang, Antonis C. Kakas, Emil Lupu:
Helping Forensic Analysts to Attribute Cyber-Attacks: An Argumentation-Based Reasoner. PRIMA 2018: 510-518 - [c106]Seraphin B. Calo, Dinesh C. Verma, Supriyo Chakraborty, Elisa Bertino, Emil Lupu, Gregory H. Cirincione:
Self-Generation of Access Control Policies. SACMAT 2018: 39-47 - [d1]Hassan Chizari, Emil Lupu:
IPI values of heart beats. Zenodo, 2018 - [i10]Andrea Paudice, Luis Muñoz-González, András György, Emil C. Lupu:
Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection. CoRR abs/1802.03041 (2018) - [i9]Andrea Paudice, Luis Muñoz-González, Emil C. Lupu:
Label Sanitization against Label Flipping Poisoning Attacks. CoRR abs/1803.00992 (2018) - [i8]Hassan Chizari, Emil Lupu:
Extracting Randomness From The Trend of IPI for Cryptographic Operators in Implantable Medical Devices. CoRR abs/1806.10984 (2018) - [i7]Ziyi Bao, Luis Muñoz-González, Emil C. Lupu:
Mitigation of Adversarial Attacks through Embedded Feature Selection. CoRR abs/1808.05705 (2018) - [i6]Kenneth T. Co, Luis Muñoz-González, Emil C. Lupu:
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Neural Networks. CoRR abs/1810.00470 (2018) - 2017
- [j20]Vittorio P. Illiano, Luis Muñoz-González, Emil C. Lupu:
Don't fool Me!: Detection, Characterisation and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 14(3): 279-293 (2017) - [j19]Luis Muñoz-González, Daniele Sgandurra, Andrea Paudice, Emil C. Lupu:
Efficient Attack Graph Analysis through Approximate Inference. ACM Trans. Priv. Secur. 20(3): 10:1-10:30 (2017) - [c105]Erisa Karafili, Antonis C. Kakas, Nikolaos I. Spanoudakis, Emil C. Lupu:
Argumentation-Based Security for Social Good. AAAI Fall Symposia 2017: 164-170 - [c104]Seraphin B. Calo, Emil Lupu, Elisa Bertino, Saritha Arunkumar, Gregory H. Cirincione, Brian Rivera, Alan Cullen:
Research challenges in dynamic policy-based autonomous security. IEEE BigData 2017: 2970-2973 - [c103]Erisa Karafili, Emil C. Lupu, Alan Cullen, Bill Williams, Saritha Arunkumar, Seraphin B. Calo:
Improving data sharing in data rich environments. IEEE BigData 2017: 2998-3005 - [c102]Luis Muñoz-González, Battista Biggio, Ambra Demontis, Andrea Paudice, Vasin Wongrassamee, Emil C. Lupu, Fabio Roli:
Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization. AISec@CCS 2017: 27-38 - [c101]Martín Barrère, Emil C. Lupu:
Naggen: A network attack graph generation tool - IEEE CNS 17 poster. CNS 2017: 378-379 - [c100]Martín Barrère, Rodrigo Vieira Steiner, Rabih Mohsen, Emil C. Lupu:
Tracking the bad guys: An efficient forensic methodology to trace multi-step attacks using core attack graphs. CNSM 2017: 1-7 - [c99]Alan Cullen, Bill Williams, Elisa Bertino, Saritha Arunkumar, Erisa Karafili, Emil Lupu:
Mission Support for Drones: a Policy Based Approach. DroNet@MobiSys 2017: 7-12 - [c98]Erisa Karafili, Emil C. Lupu:
Enabling Data Sharing in Contextual Environments: Policy Representation and Analysis. SACMAT 2017: 231-238 - [c97]Saritha Arunkumar, Stephen Pipes, Christian Makaya, Elisa Bertino, Erisa Karafili, Emil C. Lupu, Christopher Williams:
Next generation firewalls for dynamic coalitions. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c96]Diane Felmlee, Emil Lupu, Cassie McMillan, Erisa Karafili, Elisa Bertino:
Decision-making in policy governed human-autonomous systems teams. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c95]Erisa Karafili, Emil C. Lupu, Saritha Arunkumar, Elisa Bertino:
Argumentation-based policy analysis for drone systems. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c94]Erisa Karafili, Stephen Pipes, Emil C. Lupu:
Verification techniques for policy based systems. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c93]Vittorio P. Illiano, Rodrigo Vieira Steiner, Emil C. Lupu:
Unity is strength!: combining attestation and measurements inspection to handle malicious data injections in WSNs. WISEC 2017: 134-144 - [i5]Erisa Karafili, Antonis C. Kakas, Nikolaos I. Spanoudakis, Emil C. Lupu:
Argumentation-based Security for Social Good. CoRR abs/1705.00732 (2017) - [i4]Luis Muñoz-González, Battista Biggio, Ambra Demontis, Andrea Paudice, Vasin Wongrassamee, Emil C. Lupu, Fabio Roli:
Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization. CoRR abs/1708.08689 (2017) - 2016
- [j18]Daniele Sgandurra, Emil C. Lupu:
Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems. ACM Comput. Surv. 48(3): 46:1-46:38 (2016) - [j17]Rodrigo Vieira Steiner, Emil Lupu:
Attestation in Wireless Sensor Networks: A Survey. ACM Comput. Surv. 49(3): 51:1-51:31 (2016) - [c92]Daniele Sgandurra, Erisa Karafili, Emil Lupu:
Formalizing Threat Models for Virtualized Systems. DBSec 2016: 251-267 - [i3]Luis Muñoz-González, Daniele Sgandurra, Andrea Paudice, Emil C. Lupu:
Efficient Attack Graph Analysis through Approximate Inference. CoRR abs/1606.07025 (2016) - [i2]Daniele Sgandurra, Luis Muñoz-González, Rabih Mohsen, Emil C. Lupu:
Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection. CoRR abs/1609.03020 (2016) - 2015
- [j16]Vittorio P. Illiano, Emil C. Lupu:
Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey. ACM Comput. Surv. 48(2): 24:1-24:33 (2015) - [j15]Alberto E. Schaeffer Filho, Emil C. Lupu, Morris Sloman:
Federating Policy-Driven Autonomous Systems: Interaction Specification and Management Patterns. J. Netw. Syst. Manag. 23(3): 753-793 (2015) - [j14]Vittorio P. Illiano, Emil C. Lupu:
Detecting Malicious Data Injections in Event Detection Wireless Sensor Networks. IEEE Trans. Netw. Serv. Manag. 12(3): 496-510 (2015) - [c91]Pedro Rodrigues, Emil Constantine Lupu, Jeffrey Kramer:
Compositional Reliability Analysis for Probabilistic Component Automata. MiSE@ICSE 2015: 19-24 - [c90]Daniele Sgandurra, Francesco Di Cerbo, Slim Trabelsi, Fabio Martinelli, Emil C. Lupu:
Sharing Data through Confidential Clouds: An Architectural Perspective. TELERISE@ICSE 2015: 58-61 - [c89]Pedro Rodrigues, Jeff Kramer, Emil C. Lupu:
On re-assembling self-managed components. IM 2015: 727-733 - [e3]Joaquín García-Alfaro, Jordi Herrera-Joancomartí, Emil Lupu, Joachim Posegga, Alessandro Aldini, Fabio Martinelli, Neeraj Suri:
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8872, Springer 2015, ISBN 978-3-319-17015-2 [contents] - [i1]Luis Muñoz-González, Daniele Sgandurra, Martín Barrère, Emil C. Lupu:
Exact Inference Techniques for the Dynamic Analysis of Attack Graphs. CoRR abs/1510.02427 (2015) - 2014
- [c88]Jose Rivera-Rubio, Ioannis Alexiou, Luke Dickens, Riccardo Secoli, Emil C. Lupu, Anil Anthony Bharath:
Associating locations from wearable cameras. BMVC 2014 - [c87]Pedro Rodrigues, Emil Lupu, Jeff Kramer:
LTSA-PCA: tool support for compositional reliability analysis. ICSE Companion 2014: 548-551 - [c86]Luke Dickens, Emil Lupu:
On efficient meta-data collection for crowdsensing. PerCom Workshops 2014: 62-67 - 2012
- [j13]Eskindir Asmare, Anandha Gopalan, Morris Sloman, Naranker Dulay, Emil Lupu:
Self-Management Framework for Mobile Autonomous Systems. J. Netw. Syst. Manag. 20(2): 244-275 (2012) - 2011
- [c85]Jiefei Ma, Alessandra Russo, Krysia Broda, Emil Lupu:
Multi-agent abductive reasoning with confidentiality. AAMAS 2011: 1137-1138 - [c84]Jorge Lobo, Jiefei Ma, Alessandra Russo, Emil Lupu, Seraphin B. Calo, Morris Sloman:
Refinement of History-Based Policies. Logic Programming, Knowledge Representation, and Nonmonotonic Reasoning 2011: 280-299 - [c83]Robert Craven, Jorge Lobo, Emil Lupu, Alessandra Russo, Morris Sloman:
Policy refinement: Decomposition and operationalization for dynamic domains. CNSM 2011: 1-9 - [c82]Pedro Rodrigues, Emil Lupu:
Model-based Self-Adaptive Components: A preliminary approach. ICCSW 2011: 73-72 - [c81]Jiefei Ma, Alessandra Russo, Krysia Broda, Emil Lupu:
Multi-agent Confidential Abductive Reasoning. ICLP (Technical Communications) 2011: 175-186 - [c80]Andreas Markitanis, Domenico Corapi, Alessandra Russo, Emil C. Lupu:
Learning User Behaviours in Real Mobile Domains. ILP (Late Breaking Papers) 2011: 43-51 - [c79]Domenico Corapi, Alessandra Russo, Emil Lupu:
Inductive Logic Programming in Answer Set Programming. ILP 2011: 91-97 - [c78]Anandha Gopalan, Vaibhav Gowadia, Enrico Scalavino, Emil Lupu:
Policy Driven Remote Attestation. MobiSec 2011: 148-159 - 2010
- [j12]Morris Sloman, Emil C. Lupu:
Engineering Policy-Based Ubiquitous Systems. Comput. J. 53(7): 1113-1127 (2010) - [c77]Jiefei Ma, Alessandra Russo, Krysia Broda, Emil Lupu:
Distributed abductive reasoning with constraints. AAMAS 2010: 1381-1382 - [c76]Fabrizio Maria Maggi, Domenico Corapi, Alessandra Russo, Emil Lupu, Giuseppe Visaggio:
Revising Process Models through Inductive Learning. Business Process Management Workshops 2010: 182-193 - [c75]Enrico Scalavino, Giovanni Russello, Rudi Ball, Vaibhav Gowadia, Emil C. Lupu:
An opportunistic authority evaluation scheme for data security in crisis management scenarios. AsiaCCS 2010: 157-168 - [c74]Robert Craven, Jorge Lobo, Emil C. Lupu, Alessandra Russo, Morris Sloman:
Decomposition techniques for policy refinement. CNSM 2010: 72-79 - [c73]Jiefei Ma, Krysia Broda, Alessandra Russo, Emil Lupu:
Distributed Abductive Reasoning with Constraints. DALT 2010: 148-166 - [c72]Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu:
A Labelling System for Derived Data Control. DBSec 2010: 65-80 - [c71]Vaibhav Gowadia, Enrico Scalavino, Emil C. Lupu, Dmitry Starostin, Alexey Orlov:
Secure cross-domain data sharing architecture for crisis management. Digital Rights Management Workshop 2010: 43-46 - [c70]Domenico Corapi, Alessandra Russo, Emil Lupu:
Inductive Logic Programming as Abductive Search. ICLP (Technical Communications) 2010: 54-63 - [c69]Giovanni Russello, Enrico Scalavino, Naranker Dulay, Emil C. Lupu:
Coordinating Data Usage Control in Loosely-Connected Networks. POLICY 2010: 30-39 - [c68]Enrico Scalavino, Vaibhav Gowadia, Rudi Ball, Emil C. Lupu, Giovanni Russello:
Mobile PAES: Demonstrating Authority Devolution for Policy Evaluation in Crisis Management Scenarios. POLICY 2010: 53-56
2000 – 2009
- 2009
- [j11]Marinos Charalambides, Paris Flegkas, George Pavlou, Javier Rubio-Loyola, Arosha K. Bandara, Emil C. Lupu, Alessandra Russo, Naranker Dulay, Morris Sloman:
Policy conflict analysis for diffserv quality of service management. IEEE Trans. Netw. Serv. Manag. 6(1): 15-30 (2009) - [j10]Yanmin Zhu, Sye Loong Keoh, Morris Sloman, Emil C. Lupu:
A lightweight policy system for body sensor networks. IEEE Trans. Netw. Serv. Manag. 6(3): 137-148 (2009) - [c67]Jiefei Ma, Alessandra Russo, Krysia Broda, Emil Lupu:
Multi-agent planning with confidentiality. AAMAS (2) 2009: 1275-1276 - [c66]Robert Craven, Jorge Lobo, Jiefei Ma, Alessandra Russo, Emil C. Lupu, Arosha K. Bandara:
Expressive policy analysis with enhanced system dynamicity. AsiaCCS 2009: 239-250 - [c65]Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu:
PAES: Policy-Based Authority Evaluation Scheme. DBSec 2009: 268-282 - [c64]Kevin P. Twidle, Naranker Dulay, Emil Lupu, Morris Sloman:
Po