Mauricio Papa

According to our database1, Mauricio Papa authored at least 47 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Graph Autoencoders for Detecting Anomalous Intrusions in OT Networks Through Dynamic Link Detection.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Feature Engineering in Machine Learning-Based Intrusion Detection Systems for OT Networks.
Proceedings of the 2023 IEEE International Conference on Smart Computing, 2023

2020
Formal Verification of Functional Requirements for Smart Contract Compositions in Supply Chain Management Systems.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
Practical Cyber-Security Solutions for the Science DMZ.
Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning), 2019

Automatic Identification of Critical Digital Assets.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Selection of Optimal Closure Relationships for Multiphase Flow using a Genetic Algorithm.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Platform-Agnostic Language to Map Control Primitives to SCADA Communication Protocols.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Using Bro with a Simulation Model to Detect Cyber-Physical Attacks in a Nuclear Reactor.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Anomaly Detection Sensors for a Modbus-Based Oil and Gas Well-Monitoring System.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Securing Over-The-Air IoT Firmware Updates using Blockchain.
Proceedings of the International Conference on Omni-Layer Intelligent Systems, 2019

2018
Automatic Generation of Attack Scripts from Attack Graphs.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

2017
Undergraduate Educational Pathways for Developing a High-Performance Computing Workforce.
Proceedings of the Practice and Experience in Advanced Research Computing 2017: Sustainability, 2017

Introducing priority into hybrid attack graphs.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

Simulation and analysis framework for cyber-physical systems.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

2016
On the use of open-source firewalls in ICS/SCADA systems.
Inf. Secur. J. A Glob. Perspect., 2016

A SCADA Intrusion Detection Framework that Incorporates Process Semantics.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2014
Modeling and simulation of electric power substation employing an IEC 61850 network.
Proceedings of the Cyber and Information Security Research Conference, 2014

A framework for the design and deployment of a SCADA honeynet.
Proceedings of the Cyber and Information Security Research Conference, 2014

2013
Estimating link availability and timing delays in ethernet-based networks.
Proceedings of the Cyber Security and Information Intelligence, 2013

2012
Security Risks Associated with Radio Frequency Identification in Medical Environments.
J. Medical Syst., 2012

A situational awareness framework for securing the smart grid using monitoring sensors and threat models.
Int. J. Electron. Secur. Digit. Forensics, 2012

2011
A Situational Awareness Architecture for the Smart Grid.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

2009
A Taxonomy of Attacks on the DNP3 Protocol.
Proceedings of the Critical Infrastructure Protection III, 2009

Providing Situational Awareness for Pipeline Control Operations.
Proceedings of the Critical Infrastructure Protection III, 2009

2008
Forensic analysis of SCADA systems and networks.
Int. J. Secur. Networks, 2008

Attack taxonomies for the Modbus protocols.
Int. J. Crit. Infrastructure Prot., 2008

Assessing The Integrity Of Field Devices In Modbus Networks.
Proceedings of the Critical Infrastructure Protection II, 2008

2007
Passive Scanning in Modbus Networks.
Proceedings of the Critical Infrastructure Protection, 2007

Security Analysis of Multilayer SCADA Protocols.
Proceedings of the Critical Infrastructure Protection, 2007

Security Strategies for SCADA Networks.
Proceedings of the Critical Infrastructure Protection, 2007

2006
An Architecture for SCADA Network Forensics.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

Attribute selection using information gain for a fuzzy logic intrusion detection system.
Proceedings of the Data Mining, 2006

2005
A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks.
J. Netw. Syst. Manag., 2005

Implementation of a Hybrid Intrusion Detection System Using Fuzzyjess.
Proceedings of the ICEIS 2005, 2005

A Framework for Hybrid Fuzzy Logic Intrusion Detection Systems.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2005

2004
Cryptographic Protocol Analysis using Goal Extraction.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

2003
Programmable Access Control.
J. Comput. Secur., 2003

Integrating Logics and Process Calculi for Cryptographic Protocol Analysis.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

2002
Implementation and Verification of Programmable Security.
Proceedings of the Research Directions in Data and Applications Security, 2002

On Modeling Computer Networks for Vulnerability Analysis.
Proceedings of the Research Directions in Data and Applications Security, 2002

2001
Evaluating controller robustness using cell mapping.
Fuzzy Sets Syst., 2001

Formal Analysis of E-Commerce Protocols.
Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems, 2001

2000
Simulation and Analysis of Cryptographic Protocols.
Proceedings of the Data and Application Security, 2000

Extending Java for Package based Access Control.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
Security Policy Coordination for Heterogeneous Information Systems.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Programmable Security for Object-Oriented Systems.
Proceedings of the Database Security XII: Status and Prospects, 1998

1997
An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects.
Proceedings of the Database Securty XI: Status and Prospects, 1997


  Loading...