Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Musa Mohamed O. I.
Claudia Calabrese
Hao Mao
Peter Malec
Jordan Doyle
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Mike Bauer
Home
/
Author
/
SANDRA RUEDA
Author Info
Open Visualization
Name
Affiliation
Papers
SANDRA RUEDA
Systems and Internet Infrastructure Security Laboratory (SIIS), Computer Science and Engineering, Pennsylvania State University
19
Collaborators
Citations
PageRank
40
137
12.72
Referers
Referees
References
343
665
302
Search Limit
100
665
Publications (19 rows)
Collaborators (40 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Access Control Policies for Network Function Virtualization environments in Industrial Control Systems
1
0.34
2020
The Android OS stack and its vulnerabilities: an empirical study
3
0.36
2019
Leveraging Software-Defined Networking for Incident Response in Industrial Control Systems.
5
0.54
2018
Device and User Management for Smart Homes
0
0.34
2018
Virtual incident response functions in control systems.
2
0.37
2018
Jif-Based Verification of Information Flow Policies for Android Apps.
0
0.34
2017
Sexual Intimacy in the Age of Smart Devices: Are We Practicing Safe IoT?
2
0.37
2017
Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer.
1
0.37
2015
Flowfence: a denial of service defense system for software defined networking
0
0.34
2015
Extending the Floodlight Controller
4
0.37
2015
Transforming commodity security policies to enforce Clark-Wilson integrity
4
0.42
2012
Integrity walls: finding attack surfaces from mandatory access control policies
20
0.71
2012
A logical specification and analysis for SELinux MLS policy
42
2.41
2010
An architecture for enforcing end-to-end access control over web applications
12
0.61
2010
Analysis of virtual machine system policies
6
0.49
2009
Flexible security configuration for virtual machines
4
0.48
2008
Verifying Compliance of Trusted Programs
8
2.28
2008
From trusted to secure: building and executing applications that enforce system security
21
1.19
2007
Protecting users from "themselves"
2
0.38
2007
1