default search action
Carlos E. Rubio-Medrano
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j3]Hadi Mahdipour, Alireza Sharifi, Mehdi Sookhak, Carlos E. Rubio-Medrano:
Ultrafusion: Optimal Fuzzy Fusion in Land-Cover Segmentation Using Multiple Panchromatic Satellite Images. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17: 5721-5733 (2024) - [c32]Yoonsik Cheon, Bozhen Liu, Carlos E. Rubio-Medrano:
Asserting Frame Properties. ICSOFT 2024: 145-152 - [c31]Jacob Hopkins, Carlos E. Rubio-Medrano:
SecureCheck: User-Centric and Geolocation-Aware Access Mediation Contracts for Sharing Private Data. SACMAT 2024 - [c30]Jennifer Mondragon, Gael Cruz, Dvijesh Shastri, Carlos E. Rubio-Medrano:
Circles of Trust: A Voice-Based Authorization Scheme for Securing IoT Smart Homes. SACMAT 2024 - [c29]Carlos E. Rubio-Medrano, Akash Kotak, Wenlu Wang, Karsten Sohr:
Pairing Human and Artificial Intelligence: Enforcing Access Control Policies with LLMs and Formal Specifications. SACMAT 2024 - [c28]Efrén López-Morales, Ulysse Planta, Carlos E. Rubio-Medrano, Ali Abbasi, Alvaro A. Cárdenas:
SoK: Security of Programmable Logic Controllers. USENIX Security Symposium 2024 - [i1]Efrén López-Morales, Ulysse Planta, Carlos E. Rubio-Medrano, Ali Abbasi, Alvaro A. Cárdenas:
SoK: Security of Programmable Logic Controllers. CoRR abs/2403.00280 (2024) - 2023
- [j2]Carlos E. Rubio-Medrano, Pradeep Kumar Duraisamy Soundrapandian, Matthew Hill, Luis Claramunt, Jaejong Baek, Geetha S, Gail-Joon Ahn:
DyPolDroid: Protecting Against Permission-Abuse Attacks in Android. Inf. Syst. Frontiers 25(2): 529-548 (2023) - [c27]Abdullah Kamal, Jeremy Vidaurri, Carlos E. Rubio-Medrano:
No-Fly-Zone: Regulating Drone Fly-Overs Via Government and User-Controlled Authorization Zones. MobiHoc 2023: 522-527 - [c26]Arturo Gonzalez, Amani Davidson, Carlos E. Rubio-Medrano:
Poster: No Fly-Zone: Drone Policies for Ensuring Safe Operations in Restricted Areas. MobiHoc 2023: 586-588 - [c25]Yunpeng Jack Zhang, Kailai Wang, Lingguang Song, Amaury Lendasse, Houbing Herbert Song, Zhu Han, Rakesh M. Verma, Arlei Silva, Carlos E. Rubio-Medrano, Zhixia Richard Li, Guohui Zhang:
USDOT Tier-1 University Transportation Center for Advancing Cybersecurity Research and Education. MOST 2023: 237-241 - [c24]Luis Claramunt, Carlos E. Rubio-Medrano, Jaejong Baek, Gail-Joon Ahn:
SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality. SACMAT 2023: 79-90 - 2022
- [c23]Ananta Soneji, Faris Bugra Kokulu, Carlos E. Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé:
"Flawed, but like democracy we don't have a better system": The Experts' Insights on the Peer Review Process of Evaluating Security Papers. SP 2022: 1845-1862 - 2021
- [c22]Matthew Hill, Carlos E. Rubio-Medrano, Luis Claramunt, Jaejong Baek, Gail-Joon Ahn:
Poster: DyPolDroid: User-Centered Counter-Policies Against Android Permission-Abuse Attacks. EuroS&P 2021: 704-706 - [c21]Luis Claramunt, Larissa Pokam Epse, Carlos E. Rubio-Medrano, Jaejong Baek, Gail-Joon Ahn:
Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality Technologies. EuroS&P 2021: 713-715 - [c20]Carlos E. Rubio-Medrano, Matthew Hill, Luis M. Claramunt, Jaejong Baek, Gail-Joon Ahn:
DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android. SKM 2021: 23-36 - [c19]Zhibo Sun, Adam Oest, Penghui Zhang, Carlos E. Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service. USENIX Security Symposium 2021: 4169-4186 - 2020
- [c18]Efrén López-Morales, Carlos E. Rubio-Medrano, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang, Tiffany Bao, Gail-Joon Ahn:
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems. CCS 2020: 279-291 - [c17]Carlos E. Rubio-Medrano, Luis Claramunt, Shaishavkumar Jogani, Gail-Joon Ahn:
Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies. SACMAT 2020: 131-144 - [c16]Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
Toward Automated Enforcement of Cyber-Physical Security Requirements for Energy Delivery Systems. TPS-ISA 2020: 319-322
2010 – 2019
- 2019
- [c15]Zhibo Sun, Carlos E. Rubio-Medrano, Ziming Zhao, Tiffany Bao, Adam Doupé, Gail-Joon Ahn:
Understanding and Predicting Private Interactions in Underground Forums. CODASPY 2019: 303-314 - [c14]Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems. MSCPES@CPSIoTWeek 2019: 1-6 - [c13]Bernhard J. Berger, Christian Maeder, Rodrigue Wete Nguempnang, Karsten Sohr, Carlos E. Rubio-Medrano:
Towards Effective Verification of Multi-Model Access Control Properties. SACMAT 2019: 149-160 - [c12]Carlos E. Rubio-Medrano, Shaishavkumar Jogani, Maria Leitner, Ziming Zhao, Gail-Joon Ahn:
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies. SACMAT 2019: 195-206 - 2018
- [c11]Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS. CHASE 2018: 94-99 - [c10]Vu Coughlin, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems. SmartGridComm 2018: 1-6 - 2017
- [c9]Carlos E. Rubio-Medrano, Josephine Lamp, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control. MTD@CCS 2017: 39-49 - [c8]Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements. CIC 2017: 1-10 - 2016
- [b1]Carlos E. Rubio-Medrano:
Federated Access Management for Collaborative Environments. Arizona State University, Tempe, USA, 2016 - [c7]Carlos E. Rubio-Medrano, Josephine Lamp, Marthony Taguinod, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control. ABAC@CODASPY 2016: 68-71 - 2015
- [j1]Carlos E. Rubio-Medrano, Gail-Joon Ahn, Karsten Sohr:
Achieving Security Assurance with Assertion-based Application Construction. EAI Endorsed Trans. Collab. Comput. 1(6): e3 (2015) - [c6]Carlos E. Rubio-Medrano, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Federated Access Management for Collaborative Network Environments: Framework and Case Study. SACMAT 2015: 125-134 - 2014
- [c5]Carlos E. Rubio-Medrano, Gail-Joon Ahn, Karsten Sohr:
Achieving security assurance with assertion-based application construction. CollaborateCom 2014: 503-510 - 2013
- [c4]Carlos E. Rubio-Medrano, Clinton D'Souza, Gail-Joon Ahn:
Supporting secure collaborations with attribute-based access control. CollaborateCom 2013: 525-530 - [c3]Carlos E. Rubio-Medrano, Gail-Joon Ahn, Karsten Sohr:
Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned. COMPSAC 2013: 21-26
2000 – 2009
- 2007
- [c2]Yoonsik Cheon, Carlos E. Rubio-Medrano:
Random Test Data Generation for Java Classes Annotated with JML Specifications. Software Engineering Research and Practice 2007: 385-391 - [c1]Hyotaeg Jung, Carlos E. Rubio-Medrano, W. Eric Wong, Yoonsik Cheon:
Architectural Assertions: Checking Architectural Constraints at Run-Time. Software Engineering Research and Practice 2007: 604-607
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 21:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint