Search


Current filters:

Start a new search
Add filters:

Use filters to refine the search results.


Results 11-20 of 38 (Search time: 0.002 seconds).
Item hits:
PreviewIssue DateTitleAuthor(s)
2018Clear as MUD: Generating, validating and applying IoT behavioral profilesHamza, A.; Ranathunga, D.; Gharakheili, H.H.; Roughan, M.; Sivaraman, V.; ACM SIGCOMM Workshop on IoT Security and Privacy (IoT S&P) (20 Aug 2018 : Budapest)
2013STRIP: privacy-preserving vector-based routingHenecka, W.; Roughan, M.; Fu, X.; Hilt, V.; Wolf, T.; Zhang, L.; Zhang, Z.; 21st IEEE International Conference on Network Protocols (ICNP) (7 Oct 2013 - 10 Oct 2013 : Gottingen, Germany)
2017Controlled synthesis of traffic matricesTune, P.; Roughan, M.
2015Identifying the missing aspects of the ANSI/ISA best practices for security policyRanathunga, D.; Roughan, M.; Kernick, P.; Falkner, N.; Nguyen, H.; 1st ACM Workshop on Cyber-Physical System Security (CPSS) (14 Apr 2015 : Singapore, Republic of Singapore)
2016The mathematical foundations for mapping policies to network devicesRanathunga, D.; Roughan, M.; Kernick, P.; Falkner, N.; Callegari, C.; VanSinderen, M.; Sarigiannidis, P.; Samarati, P.; Cabello, E.; Lorenz, P.; Obaidat, M.; 13th International Joint Conference on e-Business and Telecommunications (ICETE) (26 Jul 2016 - 28 Jul 2016 : Lisbon, Portugal)
2014COLD: Pop-level network topology synthesisBowden, R.; Roughan, M.; Bean, N.; 10th ACM International on Conference on emerging Networking Experiments and Technologies (CoNEXT) (2 Dec 2014 - 5 Dec 2014 : Sydney, NSW)
2017Fast generation of spatially embedded random networksParsonage, E.; Roughan, M.
2016Towards standardising firewall reportingRanathunga, D.; Roughan, M.; Kernick, P.; Falkner, N.; Becue, A.; CuppensBoulahia, N.; Cuppens, F.; Katsikas, S.; Lambrinoudakis, C.; 1st Workshop on Cybersecurity of Industrial Control Systems (CyberICS), 1st Workshop on the Security of Cyber-Physical Systems (WOS-CPS) (21 Sep 2015 - 22 Sep 2015 : Vienna, Austria)
2015Privacy-preserving fraud detection across multiple phone record databasesHenecka, W.; Roughan, M.
2016Verifiable policy-defined networking for security managementRanathunga, D.; Roughan, M.; Kernick, P.; Falkner, N.; Nguyen, H.; McClintock, M.; Mihailescu, M.; Callegari, C.; VanSinderen, M.; Sarigiannidis, P.; Samarati, P.; Cabello, E.; Lorenz, P.; Obaidat, M.S.; 13th International Joint Conference on e-Business and Telecommunications (ICETE) (26 Jul 2016 - 28 Jul 2016 : Lisbon, Portugal)