Sandra Julieta Rueda

Orcid: 0000-0002-2111-9348

According to our database1, Sandra Julieta Rueda authored at least 30 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Searchable Symmetric Encryption for Private Data Protection in Cloud Environments.
Proceedings of the 11th Latin-American Symposium on Dependable Computing, 2022

2021
Dynamic Data Integration for Resilience to Sensor Attacks in Multi-Agent Systems.
IEEE Access, 2021

2020
Unsupervised and incremental learning orchestration for cyber-physical security.
Trans. Emerg. Telecommun. Technol., 2020

Blockchain and artificial intelligence for network security.
Ann. des Télécommunications, 2020

Access Control Policies for Network Function Virtualization environments in Industrial Control Systems.
Proceedings of the 4th Conference on Cloud and Internet of Things, 2020

2019
Comprehgensive Security for Body Area Networks: A Survey.
Int. J. Netw. Secur., 2019

The Android OS stack and its vulnerabilities: an empirical study.
Empir. Softw. Eng., 2019

2018
Leveraging Software-Defined Networking for Incident Response in Industrial Control Systems.
IEEE Softw., 2018

Virtual incident response functions in control systems.
Comput. Networks, 2018

Device and User Management for Smart Homes.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

A Virtual Environment for Industrial Control Systems: A Nonlinear Use-Case in Attack Detection, Identification, and Response.
Proceedings of the 4th Annual Industrial Control System Security Workshop, 2018

Automating Information Security Risk Assessment for IT Services.
Proceedings of the Applied Informatics - First International Conference, 2018

2017
SDN and NFV Security: Challenges for Integrated Solutions.
Proceedings of the Guide to Security in SDN and NFV, 2017

Jif-Based Verification of Information Flow Policies for Android Apps.
Int. J. Secur. Softw. Eng., 2017

Sexual Intimacy in the Age of Smart Devices: Are We Practicing Safe IoT?
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

2016
Q-Floid: Android Malware detection with Quantitative Data Flow Graphs.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

2015
Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

Extending the Floodlight Controller.
Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, 2015

Flowfence: a denial of service defense system for software defined networking.
Proceedings of the 2015 Global Information Infrastructure and Networking Symposium, 2015

2014
Identifying Android malware instructions.
Proceedings of the IEEE Latin-America Conference on Communications, 2014

2012
Integrity walls: finding attack surfaces from mandatory access control policies.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Transforming commodity security policies to enforce Clark-Wilson integrity.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2010
A logical specification and analysis for SELinux MLS policy.
ACM Trans. Inf. Syst. Secur., 2010

Cut me some security.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

An architecture for enforcing end-to-end access control over web applications.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

2009
Analysis of virtual machine system policies.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

2008
Verifying Compliance of Trusted Programs.
Proceedings of the 17th USENIX Security Symposium, 2008

Flexible security configuration for virtual machines.
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, 2008

2007
From Trusted to Secure: Building and Executing Applications That Enforce System Security.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

Protecting users from "themselves".
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007


  Loading...