Sheila Becker

According to our database1, Sheila Becker authored at least 12 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

2014
Newton: Securing Virtual Coordinates by Enforcing Physical Laws.
IEEE/ACM Trans. Netw., 2014

2012
Conceptual Approaches for Securing Networks and Systems.
PhD thesis, 2012

Newton Meets Vivaldi: Using Physical Laws to Secure Virtual Coordinate Systems.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Securing Virtual Coordinates by Enforcing Physical Laws.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

2011
Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Applying game theory to analyze attacks and defenses in virtual coordinate systems.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
Improving Fuzz Testing Using Game Theory.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Towards Self-defending Mechanisms Using Data Mining in the EFIPSANS Framework.
Proceedings of the Advances in Multimedia and Network Information System Technologies, 2010

An Autonomic Testing Framework for IPv6 Configuration Protocols.
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, 2010

2009
Using game theory to configure P2P SIP.
Proceedings of the Principles, 2009

Defensive configuration with game theory.
Proceedings of the Integrated Network Management, 2009


  Loading...