A logical specification and analysis for SELinux MLS policy B Hicks, S Rueda, L St. Clair, T Jaeger, P McDaniel ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010 | 122 | 2010 |
Integrity walls: Finding attack surfaces from mandatory access control policies H Vijayakumar, G Jakka, S Rueda, J Schiffman, T Jaeger Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012 | 68 | 2012 |
Leveraging software-defined networking for incident response in industrial control systems AFM Piedrahita, V Gaur, J Giraldo, AA Cardenas, SJ Rueda IEEE Software 35 (1), 44-50, 2017 | 67 | 2017 |
FlowFence: a denial of service defense system for software defined networking AFM Piedrahita, S Rueda, DMF Mattos, OCMB Duarte 2015 Global Information Infrastructure and Networking Symposium (GIIS), 1-6, 2015 | 63 | 2015 |
From Trusted to Secure: Building and Executing Applications That Enforce System Security. B Hicks, SJ Rueda, T Jaeger, PD McDaniel USENIX Annual Technical Conference 7, 34, 2007 | 60 | 2007 |
Extending the floodlight controller LV Morales, AF Murillo, SJ Rueda 2015 IEEE 14th International Symposium on Network Computing and Applications …, 2015 | 56 | 2015 |
Virtual incident response functions in control systems AFM Piedrahita, V Gaur, J Giraldo, AA Cardenas, SJ Rueda Computer Networks 135, 147-159, 2018 | 49 | 2018 |
An architecture for enforcing end-to-end access control over web applications B Hicks, S Rueda, D King, T Moyer, J Schiffman, Y Sreenivasan, ... Proceedings of the 15th ACM symposium on Access control models and …, 2010 | 42 | 2010 |
Sexual intimacy in the age of smart devices: Are we practicing safe IoT? M Wynn, K Tillotson, R Kao, A Calderon, A Murillo, J Camargo, R Mantilla, ... Proceedings of the 2017 workshop on internet of things security and privacy …, 2017 | 34 | 2017 |
The Android OS stack and its vulnerabilities: an empirical study A Mazuera-Rozo, J Bautista-Mora, M Linares-Vásquez, S Rueda, ... Empirical Software Engineering 24, 2056-2101, 2019 | 30 | 2019 |
Blockchain and artificial intelligence for network security DMF Mattos, F Krief, SJ Rueda Annals of Telecommunications 75, 101-102, 2020 | 21 | 2020 |
Verifying Compliance of Trusted Programs. SJ Rueda, D King, T Jaeger USENIX Security Symposium, 321-334, 2008 | 19 | 2008 |
A virtual environment for industrial control systems: A nonlinear use-case in attack detection, identification, and response AF Murillo, LF Cómbita, AC Gonzalez, S Rueda, AA Cardenas, N Quijano Proceedings of the 4th Annual Industrial Control System Security Workshop, 25-32, 2018 | 18 | 2018 |
Flexible security configuration for virtual machines S Rueda, Y Sreenivasan, T Jaeger Proceedings of the 2nd ACM workshop on Computer security architectures, 35-44, 2008 | 17 | 2008 |
Comprehensive security for body area networks: A survey LV Morales, D Delgado-Ruiz, SJ Rueda Int. J. Netw. Secur 21, 342-354, 2019 | 15 | 2019 |
Analysis of virtual machine system policies S Rueda, H Vijayakumar, T Jaeger Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 15 | 2009 |
Unsupervised and incremental learning orchestration for cyber‐physical security LHA Reis, A Murillo Piedrahita, S Rueda, NC Fernandes, DSV Medeiros, ... Transactions on emerging telecommunications technologies 31 (7), e4011, 2020 | 14 | 2020 |
SDN and NFV security: challenges for integrated solutions AF Murillo, SJ Rueda, LV Morales, ÁA Cárdenas Guide to Security in SDN and NFV: Challenges, Opportunities, and …, 2017 | 14 | 2017 |
Transforming commodity security policies to enforce Clark-Wilson integrity D Muthukumaran, S Rueda, N Talele, H Vijayakumar, J Teutsch, T Jaeger Proceedings of the 28th Annual Computer Security Applications Conference …, 2012 | 13 | 2012 |
Integrating SELinux with security-typed languages B Hicks, S Rueda, T Jaeger, P McDaniel Proceedings of the 3rd SELinux Symposium, 2007 | 13 | 2007 |