default search action
Sandra Julieta Rueda
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c21]Matheus Monteiro Silveira, Danielle S. Silva, Sandra J. R. Rodriguez, Rafael L. R. Gomes:
Searchable Symmetric Encryption for Private Data Protection in Cloud Environments. LADC 2022: 95-98 - 2021
- [j9]Luis Burbano, Luis Francisco Cómbita, Nicanor Quijano, Sandra Rueda:
Dynamic Data Integration for Resilience to Sensor Attacks in Multi-Agent Systems. IEEE Access 9: 31236-31245 (2021) - 2020
- [j8]Diogo Menezes Ferrazani Mattos, Francine Krief, Sandra Julieta Rueda:
Blockchain and artificial intelligence for network security. Ann. des Télécommunications 75(3-4): 101-102 (2020) - [j7]Lúcio Henrik A. Reis, Andrés Felipe Murillo-Piedrahita, Sandra Rueda, Natalia Castro Fernandes, Dianne S. V. Medeiros, Marcelo Dias de Amorim, Diogo M. F. Mattos:
Unsupervised and incremental learning orchestration for cyber-physical security. Trans. Emerg. Telecommun. Technol. 31(7) (2020) - [c20]Andrés F. Murillo P., Sandra Rueda:
Access Control Policies for Network Function Virtualization environments in Industrial Control Systems. CIoT 2020: 17-24
2010 – 2019
- 2019
- [j6]Alejandro Mazuera-Rozo, Jairo Bautista-Mora, Mario Linares-Vásquez, Sandra Rueda, Gabriele Bavota:
The Android OS stack and its vulnerabilities: an empirical study. Empir. Softw. Eng. 24(4): 2056-2101 (2019) - [j5]Laura Victoria Morales Medina, David Delgado-Ruiz, Sandra Julieta Rueda:
Comprehgensive Security for Body Area Networks: A Survey. Int. J. Netw. Secur. 21(2): 342-354 (2019) - 2018
- [j4]Andrés Felipe Murillo-Piedrahita, Vikram Gaur, Jairo Giraldo, Alvaro A. Cárdenas, Sandra Julieta Rueda:
Virtual incident response functions in control systems. Comput. Networks 135: 147-159 (2018) - [j3]Andrés Felipe Murillo-Piedrahita, Vikram Gaur, Jairo Giraldo, Alvaro A. Cárdenas, Sandra Julieta Rueda:
Leveraging Software-Defined Networking for Incident Response in Industrial Control Systems. IEEE Softw. 35(1): 44-50 (2018) - [c19]Sandra Rueda, Oscar Avila:
Automating Information Security Risk Assessment for IT Services. ICAI 2018: 183-197 - [c18]Andrés Felipe Murillo-Piedrahita, Luis Francisco Cómbita, Andrea Calderón Gonzalez, Sandra Rueda, Alvaro A. Cárdenas, Nicanor Quijano:
A Virtual Environment for Industrial Control Systems: A Nonlinear Use-Case in Attack Detection, Identification, and Response. ICSS 2018: 25-32 - [c17]Alejandro Mazuera-Rozo, Sandra Rueda:
Device and User Management for Smart Homes. NCA 2018: 1-4 - 2017
- [j2]Lina M. Jimenez, Martín Ochoa, Sandra Julieta Rueda:
Jif-Based Verification of Information Flow Policies for Android Apps. Int. J. Secur. Softw. Eng. 8(1): 28-42 (2017) - [c16]Matthew Wynn, Kyle Tillotson, Ryan Kao, Andrea Calderón Gonzalez, Andres F. Murillo P., Javier Camargo, Rafael Mantilla, Brahian Rangel, Alvaro A. Cárdenas, Sandra Julieta Rueda:
Sexual Intimacy in the Age of Smart Devices: Are We Practicing Safe IoT? IoT S&P@CCS 2017: 25-30 - [p1]Andrés F. Murillo P., Sandra Julieta Rueda, Laura Victoria Morales Medina, Alvaro A. Cárdenas:
SDN and NFV Security: Challenges for Integrated Solutions. Guide to Security in SDN and NFV 2017: 75-101 - 2016
- [c15]John Henry Castellanos, Tobias Wüchner, Martín Ochoa, Sandra Julieta Rueda:
Q-Floid: Android Malware detection with Quantitative Data Flow Graphs. SG-CRC 2016: 13-25 - 2015
- [c14]Andrés Felipe Murillo-Piedrahita, Sandra Julieta Rueda, Diogo M. F. Mattos, Otto Carlos M. B. Duarte:
Flowfence: a denial of service defense system for software defined networking. GIIS 2015: 1-6 - [c13]Laura Victoria Morales Medina, Andrés Felipe Murillo-Piedrahita, Sandra Julieta Rueda:
Extending the Floodlight Controller. NCA 2015: 126-133 - [c12]Trent Jaeger, Xinyang Ge, Divya Muthukumaran, Sandra Julieta Rueda, Joshua Schiffman, Hayawardh Vijayakumar:
Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer. SPACE 2015: 55-74 - 2014
- [c11]Laura Victoria Morales Medina, Sandra Julieta Rueda:
Identifying Android malware instructions. LATINCOM 2014: 1-7 - 2012
- [c10]Divya Muthukumaran, Sandra Julieta Rueda, Nirupama Talele, Hayawardh Vijayakumar, Jason Teutsch, Trent Jaeger:
Transforming commodity security policies to enforce Clark-Wilson integrity. ACSAC 2012: 269-278 - [c9]Hayawardh Vijayakumar, Guruprasad Jakka, Sandra Julieta Rueda, Joshua Schiffman, Trent Jaeger:
Integrity walls: finding attack surfaces from mandatory access control policies. AsiaCCS 2012: 75-76 - 2010
- [j1]Boniface Hicks, Sandra Julieta Rueda, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel:
A logical specification and analysis for SELinux MLS policy. ACM Trans. Inf. Syst. Secur. 13(3): 26:1-26:31 (2010) - [c8]Boniface Hicks, Sandra Julieta Rueda, Dave King, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick D. McDaniel, Trent Jaeger:
An architecture for enforcing end-to-end access control over web applications. SACMAT 2010: 163-172 - [c7]Divya Muthukumaran, Sandra Julieta Rueda, Hayawardh Vijayakumar, Trent Jaeger:
Cut me some security. SafeConfig 2010: 75-78
2000 – 2009
- 2009
- [c6]Sandra Julieta Rueda, Hayawardh Vijayakumar, Trent Jaeger:
Analysis of virtual machine system policies. SACMAT 2009: 227-236 - 2008
- [c5]Sandra Julieta Rueda, Yogesh Sreenivasan, Trent Jaeger:
Flexible security configuration for virtual machines. CSAW 2008: 35-44 - [c4]Sandra Julieta Rueda, Dave King, Trent Jaeger:
Verifying Compliance of Trusted Programs. USENIX Security Symposium 2008: 321-334 - 2007
- [c3]William Enck, Sandra Julieta Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel:
Protecting users from "themselves". CSAW 2007: 29-36 - [c2]Boniface Hicks, Sandra Julieta Rueda, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel:
A logical specification and analysis for SELinux MLS policy. SACMAT 2007: 91-100 - [c1]Boniface Hicks, Sandra Julieta Rueda, Trent Jaeger, Patrick D. McDaniel:
From Trusted to Secure: Building and Executing Applications That Enforce System Security. USENIX ATC 2007: 205-218
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 00:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint