Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Damas P. Gruska
@inproceedings{DBLP:conf/ccwc/AliG22, author = {Aliyu Tanko Ali and Damas P. Gruska}, title = {States of Attack Under Incomplete Information}, booktitle = {12th {IEEE} Annual Computing and Communication Workshop and Conference, {CCWC} 2022, Las Vegas, NV, USA, January 26-29, 2022}, pages = {801--807}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CCWC54503.2022.9720758}, doi = {10.1109/CCWC54503.2022.9720758}, timestamp = {Tue, 08 Mar 2022 13:12:40 +0100}, biburl = {https://dblp.org/rec/conf/ccwc/AliG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/BarbutiBGGLM21, author = {Roberto Barbuti and Pasquale Bove and Roberta Gori and Damas P. Gruska and Francesca Levi and Paolo Milazzo}, title = {Encoding Threshold Boolean Networks into Reaction Systems for the Analysis of Gene Regulatory Networks}, journal = {Fundam. Informaticae}, volume = {179}, number = {2}, pages = {205--225}, year = {2021}, url = {https://doi.org/10.3233/FI-2021-2021}, doi = {10.3233/FI-2021-2021}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/BarbutiBGGLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csp/GruskaR21, author = {Damas P. Gruska and M. Carmen Ruiz}, editor = {Holger Schlingloff and Thomas Vogel}, title = {Process Opacity and Insertion Functions}, booktitle = {Proceedings of the 29th International Workshop on Concurrency, Specification and Programming (CS{\&}P 2021), Berlin, Germany, September 27-28, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2951}, pages = {83--92}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2951/paper7.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:14 +0100}, biburl = {https://dblp.org/rec/conf/csp/GruskaR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csp/AliG21, author = {Aliyu Tanko Ali and Damas P. Gruska}, editor = {Holger Schlingloff and Thomas Vogel}, title = {Attack Trees with Time Constraints}, booktitle = {Proceedings of the 29th International Workshop on Concurrency, Specification and Programming (CS{\&}P 2021), Berlin, Germany, September 27-28, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2951}, pages = {93--105}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2951/paper5.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csp/AliG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csp/Gruska21, author = {Damas P. Gruska}, editor = {Bernd{-}Holger Schlingloff and Thomas Vogel and Andrzej Skowron}, title = {Security Enforcing}, booktitle = {Concurrency, Specification and Programming - Revised Selected Papers from the 29th International Workshop on Concurrency, Specification and Programming (CS{\&}P'21), Berlin, Germany}, series = {Studies in Computational Intelligence}, volume = {1091}, pages = {123--143}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-26651-5\_6}, doi = {10.1007/978-3-031-26651-5\_6}, timestamp = {Tue, 09 May 2023 15:20:42 +0200}, biburl = {https://dblp.org/rec/conf/csp/Gruska21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gandalf/AliG21, author = {Aliyu Tanko Ali and Damas P. Gruska}, editor = {Dario Della Monica and Gian Luca Pozzato and Enrico Scala}, title = {Dynamic Attack Trees}, booktitle = {Proceedings of the 3rd Workshop on Artificial Intelligence and Formal Verification, Logic, Automata, and Synthesis hosted by the Twelfth International Symposium on Games, Automata, Logics, and Formal Verification (GandALF 2021), Padua, Italy, September 22, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2987}, pages = {25--29}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2987/paper5.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:43 +0100}, biburl = {https://dblp.org/rec/conf/gandalf/AliG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medi/Gruska21, author = {Damas P. Gruska}, editor = {Ladjel Bellatreche and George A. Chernishev and Antonio Corral and Samir Ouchani and J{\"{u}}ri Vain}, title = {Time Insertion Functions}, booktitle = {Advances in Model and Data Engineering in the Digitalization Era - {MEDI} 2021 International Workshops: DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21-23, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1481}, pages = {181--188}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-87657-9\_14}, doi = {10.1007/978-3-030-87657-9\_14}, timestamp = {Thu, 07 Oct 2021 16:53:29 +0200}, biburl = {https://dblp.org/rec/conf/medi/Gruska21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uemcom/AliG21, author = {Aliyu Tanko Ali and Damas P. Gruska}, title = {Reversible Attack Trees}, booktitle = {12th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile Communication Conference, {UEMCON} 2021, New York, NY, USA, December 1-4, 2021}, pages = {279--285}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/UEMCON53757.2021.9666564}, doi = {10.1109/UEMCON53757.2021.9666564}, timestamp = {Tue, 18 Jan 2022 17:38:45 +0100}, biburl = {https://dblp.org/rec/conf/uemcom/AliG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/GoriGM19, author = {Roberta Gori and Damas P. Gruska and Paolo Milazzo}, title = {Studying Opacity of Reaction Systems through Formula Based Predictors}, journal = {Fundam. Informaticae}, volume = {165}, number = {3-4}, pages = {303--319}, year = {2019}, url = {https://doi.org/10.3233/FI-2019-1787}, doi = {10.3233/FI-2019-1787}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/GoriGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csp/AliG19, author = {Aliyu Tanko Ali and Damas P. Gruska}, editor = {Krzysztof Ropiak and Lech Polkowski and Piotr Artiemjew}, title = {Attack Protection Tree}, booktitle = {Proceedings of the 28th International Workshop on Concurrency, Specification and Programming, Olsztyn, Poland, September 24-26th, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2571}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2571/CSP2019\_paper\_7.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:14 +0100}, biburl = {https://dblp.org/rec/conf/csp/AliG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csp/GruskaR19, author = {Damas P. Gruska and M. Carmen Ruiz}, editor = {Krzysztof Ropiak and Lech Polkowski and Piotr Artiemjew}, title = {Observations, Testing and Security}, booktitle = {Proceedings of the 28th International Workshop on Concurrency, Specification and Programming, Olsztyn, Poland, September 24-26th, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2571}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2571/CSP2019\_paper\_6.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csp/GruskaR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/GruskaR19, author = {Damas P. Gruska and M. Carmen Ruiz}, editor = {Jo{\~{a}}o M. F. Rodrigues and Pedro J. S. Cardoso and J{\^{a}}nio M. Monteiro and Roberto Lam and Valeria V. Krzhizhanovskaya and Michael Harold Lees and Jack J. Dongarra and Peter M. A. Sloot}, title = {Security of Low Level IoT Protocols}, booktitle = {Computational Science - {ICCS} 2019 - 19th International Conference, Faro, Portugal, June 12-14, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11538}, pages = {621--633}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22744-9\_48}, doi = {10.1007/978-3-030-22744-9\_48}, timestamp = {Tue, 07 May 2024 20:07:42 +0200}, biburl = {https://dblp.org/rec/conf/iccS/GruskaR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwann/GruskaR19, author = {Damas P. Gruska and M. Carmen Ruiz}, editor = {Ignacio Rojas and Gonzalo Joya and Andreu Catal{\`{a}}}, title = {Security Testing for Multi-Agent Systems}, booktitle = {Advances in Computational Intelligence - 15th International Work-Conference on Artificial Neural Networks, {IWANN} 2019, Gran Canaria, Spain, June 12-14, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11506}, pages = {703--715}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-20521-8\_58}, doi = {10.1007/978-3-030-20521-8\_58}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwann/GruskaR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/Gruska19, author = {Damas P. Gruska}, editor = {Yannis Manolopoulos and George Angelos Papadopoulos and Athena Stassopoulou and Ioanna Dionysiou and Ioannis Kyriakides and Nicolas Tsapatsoulis}, title = {Security and time insertion}, booktitle = {Proceedings of the 23rd Pan-Hellenic Conference on Informatics, {PCI} 2019, Nicosia, Cyprus, November 28-30, 2019}, pages = {154--157}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3368640.3368668}, doi = {10.1145/3368640.3368668}, timestamp = {Sun, 08 Dec 2019 13:58:41 +0100}, biburl = {https://dblp.org/rec/conf/pci/Gruska19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartiot/RuizGGOHR19, author = {M. Carmen Ruiz and Celia Garrido{-}Hidalgo and Damas P. Gruska and Teresa Olivares and Diego Hortelano and Luis Roda{-}Sanchez}, title = {Modeling and Evaluation of a Power-Aware Algorithm for IoT Bluetooth Low Energy Devices}, booktitle = {2019 {IEEE} International Conference on Smart Internet of Things (SmartIoT), Tianjin, China, August 9-11, 2019}, pages = {28--35}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SmartIoT.2019.00014}, doi = {10.1109/SMARTIOT.2019.00014}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smartiot/RuizGGOHR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csp/GoriGM18, author = {Roberta Gori and Damas P. Gruska and Paolo Milazzo}, editor = {Bernd{-}Holger Schlingloff and Samira Akili}, title = {Hidden States in Reaction Systems}, booktitle = {Proceedings of the 27th International Workshop on Concurrency, Specification and Programming, Berlin, Germany, September 24-26, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2240}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2240/paper12.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:14 +0100}, biburl = {https://dblp.org/rec/conf/csp/GoriGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csp/GruskaR18, author = {Damas P. Gruska and M. Carmen Ruiz}, editor = {Bernd{-}Holger Schlingloff and Samira Akili}, title = {Opacity-enforcing for Process Algebras}, booktitle = {Proceedings of the 27th International Workshop on Concurrency, Specification and Programming, Berlin, Germany, September 24-26, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2240}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2240/paper1.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csp/GruskaR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/Gruska16, author = {Damas P. Gruska}, title = {Differential Privacy and Security}, journal = {Fundam. Informaticae}, volume = {143}, number = {1-2}, pages = {73--87}, year = {2016}, url = {https://doi.org/10.3233/FI-2016-1304}, doi = {10.3233/FI-2016-1304}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/Gruska16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csp/PatakyG16, author = {Mikul{\'{a}}s Pataky and Damas P. Gruska}, editor = {Bernd{-}Holger Schlingloff}, title = {Analysing of {M-AHIDS} with Future States on {DARPA} and {KDD99} Benchmarks}, booktitle = {Proceedings of the 25th International Workshop on Concurrency, Specification and Programming, Rostock, Germany, September 28-30, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1698}, pages = {153--164}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1698/CS\&\#38;P2016\_14\_Pataky\&\#38;Gruska\_Analysing-of-M-AHIDS-with-future-states-on-DARPA-and-KDD99-benchmarks.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:14 +0100}, biburl = {https://dblp.org/rec/conf/csp/PatakyG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csp/Gruska16, author = {Damas P. Gruska}, editor = {Bernd{-}Holger Schlingloff}, title = {Process Environment Opacity}, booktitle = {Proceedings of the 25th International Workshop on Concurrency, Specification and Programming, Rostock, Germany, September 28-30, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1698}, pages = {209--220}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1698/CS\&\#38;P2016\_20\_Gruska\_Process-Environment-Opacity.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csp/Gruska16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csp/Gruska15, author = {Damas P. Gruska}, editor = {Zbigniew Suraj and Ludwik Czaja}, title = {Gained and Excluded Classified Actions by Dynamic Security Policies}, booktitle = {Proceedings of the 24th International Workshop on Concurrency, Specification and Programming, Rzeszow, Poland, September 28-30, 2015}, series = {{CEUR} Workshop Proceedings}, volume = {1492}, pages = {170--181}, publisher = {CEUR-WS.org}, year = {2015}, url = {https://ceur-ws.org/Vol-1492/Paper\_16.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:14 +0100}, biburl = {https://dblp.org/rec/conf/csp/Gruska15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csp/KovacG15, author = {Michal Kov{\'{a}}c and Damas P. Gruska}, editor = {Zbigniew Suraj and Ludwik Czaja}, title = {Sequential {P} Systems with Active Membranes Working on Sets}, booktitle = {Proceedings of the 24th International Workshop on Concurrency, Specification and Programming, Rzeszow, Poland, September 28-30, 2015}, series = {{CEUR} Workshop Proceedings}, volume = {1492}, pages = {247--257}, publisher = {CEUR-WS.org}, year = {2015}, url = {https://ceur-ws.org/Vol-1492/Paper\_24.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csp/KovacG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ershov/Gruska15, author = {Damas P. Gruska}, editor = {Manuel Mazzara and Andrei Voronkov}, title = {Dynamics Security Policies and Process Opacity for Timed Process Algebras}, booktitle = {Perspectives of System Informatics - 10th International Andrei Ershov Informatics Conference, {PSI} 2015, in Memory of Helmut Veith, Kazan and Innopolis, Russia, August 24-27, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9609}, pages = {149--157}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-41579-6\_12}, doi = {10.1007/978-3-319-41579-6\_12}, timestamp = {Sun, 02 Jun 2019 21:19:59 +0200}, biburl = {https://dblp.org/rec/conf/ershov/Gruska15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/Gruska14, author = {Damas P. Gruska}, title = {Simulation Opacity}, journal = {Fundam. Informaticae}, volume = {133}, number = {2-3}, pages = {165--179}, year = {2014}, url = {https://doi.org/10.3233/FI-2014-1069}, doi = {10.3233/FI-2014-1069}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/Gruska14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csp/Gruska14, author = {Damas P. Gruska}, editor = {Louchka Popova{-}Zeugmann}, title = {Differential Privacy and Security}, booktitle = {Proceedings of the 23th International Workshop on Concurrency, Specification and Programming, Chemnitz, Germany, September 29 - October 1, 2014}, series = {{CEUR} Workshop Proceedings}, volume = {1269}, pages = {80--91}, publisher = {CEUR-WS.org}, year = {2014}, url = {https://ceur-ws.org/Vol-1269/paper80.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:14 +0100}, biburl = {https://dblp.org/rec/conf/csp/Gruska14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csp/PatakyG14, author = {Mikul{\'{a}}s Pataky and Damas P. Gruska}, editor = {Louchka Popova{-}Zeugmann}, title = {Multi-Agent Heterogeneous Intrusion Detection System}, booktitle = {Proceedings of the 23th International Workshop on Concurrency, Specification and Programming, Chemnitz, Germany, September 29 - October 1, 2014}, series = {{CEUR} Workshop Proceedings}, volume = {1269}, pages = {184--195}, publisher = {CEUR-WS.org}, year = {2014}, url = {https://ceur-ws.org/Vol-1269/paper184.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csp/PatakyG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ershov/Gruska14, author = {Damas P. Gruska}, editor = {Andrei Voronkov and Irina B. Virbitskaite}, title = {Process Opacity for Timed Process Algebra}, booktitle = {Perspectives of System Informatics - 9th International Ershov Informatics Conference, {PSI} 2014, St. Petersburg, Russia, June 24-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8974}, pages = {151--160}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46823-4\_13}, doi = {10.1007/978-3-662-46823-4\_13}, timestamp = {Mon, 16 Dec 2019 13:26:25 +0100}, biburl = {https://dblp.org/rec/conf/ershov/Gruska14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/Gruska13, author = {Damas P. Gruska}, title = {Information Flow Testing}, journal = {Fundam. Informaticae}, volume = {128}, number = {1-2}, pages = {81--95}, year = {2013}, url = {https://doi.org/10.3233/FI-2013-934}, doi = {10.3233/FI-2013-934}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/Gruska13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csp/Gruska13, author = {Damas P. Gruska}, editor = {Marcin S. Szczuka and Ludwik Czaja and Magdalena Kacprzak}, title = {Opacity Testing}, booktitle = {Proceedings of the 22nd International Workshop on Concurrency, Specification and Programming, Warsaw, Poland}, series = {{CEUR} Workshop Proceedings}, volume = {1032}, pages = {169--180}, publisher = {CEUR-WS.org}, year = {2013}, url = {https://ceur-ws.org/Vol-1032/paper-15.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:14 +0100}, biburl = {https://dblp.org/rec/conf/csp/Gruska13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/Gruska12, author = {Damas P. Gruska}, title = {Informational Analysis of Security and Integrity}, journal = {Fundam. Informaticae}, volume = {120}, number = {3-4}, pages = {295--309}, year = {2012}, url = {https://doi.org/10.3233/FI-2012-763}, doi = {10.3233/FI-2012-763}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/Gruska12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/Gruska12a, author = {Damas P. Gruska}, title = {Quantification of Positive and Negative Attacker's Information}, journal = {Fundam. Informaticae}, volume = {120}, number = {3-4}, pages = {311--324}, year = {2012}, url = {https://doi.org/10.3233/FI-2012-764}, doi = {10.3233/FI-2012-764}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/Gruska12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csp/Gruska12, author = {Damas P. Gruska}, editor = {Louchka Popova{-}Zeugmann}, title = {Information Flow and Concurrent Imperative Languages}, booktitle = {Proceedings of the 21th International Workshop on Concurrency, Specification and Programming, Berlin, Germany, September 26-28, 2012}, series = {{CEUR} Workshop Proceedings}, volume = {928}, pages = {123--134}, publisher = {CEUR-WS.org}, year = {2012}, url = {https://ceur-ws.org/Vol-928/0123.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:14 +0100}, biburl = {https://dblp.org/rec/conf/csp/Gruska12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csp/Gruska12a, author = {Damas P. Gruska}, editor = {Louchka Popova{-}Zeugmann}, title = {Test Based Security}, booktitle = {Proceedings of the 21th International Workshop on Concurrency, Specification and Programming, Berlin, Germany, September 26-28, 2012}, series = {{CEUR} Workshop Proceedings}, volume = {928}, pages = {135--146}, publisher = {CEUR-WS.org}, year = {2012}, url = {https://ceur-ws.org/Vol-928/0135.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csp/Gruska12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/Gruska11, author = {Damas P. Gruska}, title = {Gained and Excluded Private Actions by Process Observations}, journal = {Fundam. Informaticae}, volume = {109}, number = {3}, pages = {281--295}, year = {2011}, url = {https://doi.org/10.3233/FI-2011-511}, doi = {10.3233/FI-2011-511}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/Gruska11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/BarbutiMMG10, author = {Roberto Barbuti and Andrea Maggiolo{-}Schettini and Paolo Milazzo and Damas P. Gruska}, title = {A Notion of Biological Diagnosability Inspired by the Notion of Opacity in Systems Security}, journal = {Fundam. Informaticae}, volume = {102}, number = {1}, pages = {19--34}, year = {2010}, url = {https://doi.org/10.3233/FI-2010-294}, doi = {10.3233/FI-2010-294}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/BarbutiMMG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/Gruska10, author = {Damas P. Gruska}, title = {Process Algebra Contexts and Security Properties}, journal = {Fundam. Informaticae}, volume = {102}, number = {1}, pages = {63--76}, year = {2010}, url = {https://doi.org/10.3233/FI-2010-297}, doi = {10.3233/FI-2010-297}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/Gruska10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bionetics/Gruska10, author = {Damas P. Gruska}, editor = {Junichi Suzuki and Tadashi Nakano}, title = {Diagnosability of Nested Intruders}, booktitle = {Bio-Inspired Models of Network, Information, and Computing Systems - 5th International {ICST} Conference, {BIONETICS} 2010, Boston, MA, USA, December 1-3, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {87}, pages = {92--99}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-32615-8\_12}, doi = {10.1007/978-3-642-32615-8\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bionetics/Gruska10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/Gruska09, author = {Damas P. Gruska}, title = {Quantifying Security for Timed Process Algebras}, journal = {Fundam. Informaticae}, volume = {93}, number = {1-3}, pages = {155--169}, year = {2009}, url = {https://doi.org/10.3233/FI-2009-0094}, doi = {10.3233/FI-2009-0094}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/Gruska09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/Gruska08, author = {Damas P. Gruska}, title = {Probabilistic Information Flow Security}, journal = {Fundam. Informaticae}, volume = {85}, number = {1-4}, pages = {173--187}, year = {2008}, url = {http://content.iospress.com/articles/fundamenta-informaticae/fi85-1-4-13}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/Gruska08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/GruskaMM08, author = {Damas P. Gruska and Andrea Maggiolo{-}Schettini and Paolo Milazzo}, title = {Security in a Model for Long-running Transactions}, journal = {Fundam. Informaticae}, volume = {85}, number = {1-4}, pages = {189--203}, year = {2008}, url = {http://content.iospress.com/articles/fundamenta-informaticae/fi85-1-4-14}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/GruskaMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/Gruska07, author = {Damas P. Gruska}, title = {Observation Based System Security}, journal = {Fundam. Informaticae}, volume = {79}, number = {3-4}, pages = {335--346}, year = {2007}, url = {http://content.iospress.com/articles/fundamenta-informaticae/fi79-3-4-07}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/Gruska07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/Gruska06, author = {Damas P. Gruska}, title = {Network Information Flow}, journal = {Fundam. Informaticae}, volume = {72}, number = {1-3}, pages = {167--180}, year = {2006}, url = {http://content.iospress.com/articles/fundamenta-informaticae/fi72-1-3-13}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/Gruska06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ershov/Gruska06, author = {Damas P. Gruska}, editor = {Irina B. Virbitskaite and Andrei Voronkov}, title = {Information-Flow Attacks Based on Limited Observations}, booktitle = {Perspectives of Systems Informatics, 6th International Andrei Ershov Memorial Conference, {PSI} 2006, Novosibirsk, Russia, June 27-30, 2006. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {4378}, pages = {223--234}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-70881-0\_20}, doi = {10.1007/978-3-540-70881-0\_20}, timestamp = {Mon, 16 Dec 2019 13:26:25 +0100}, biburl = {https://dblp.org/rec/conf/ershov/Gruska06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/GruskaM01, author = {Damas P. Gruska and Andrea Maggiolo{-}Schettini}, title = {Process Algebras for Network Communication}, journal = {Fundam. Informaticae}, volume = {45}, number = {4}, pages = {359--378}, year = {2001}, url = {http://content.iospress.com/articles/fundamenta-informaticae/fi45-4-04}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/GruskaM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fct/Gruska97, author = {Damas P. Gruska}, editor = {Bogdan S. Chlebus and Ludwik Czaja}, title = {Bounded Concurrency}, booktitle = {Fundamentals of Computation Theory, 11th International Symposium, {FCT} '97, Krak{\'{o}}w, Poland, September 1-3, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1279}, pages = {198--209}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0036184}, doi = {10.1007/BFB0036184}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/fct/Gruska97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/parcella/Gruska96, author = {Damas P. Gruska}, editor = {Roland Vollmar and Werner Erhard and Vesselin Iossifov}, title = {Process Algebra for Shared Ressources}, booktitle = {Parcella 1996, {VII.} International Workshop on Parallel Processing by Cellular Automata and Arrays, Berlin, Germany, September 16-20, 1996, Proceedings}, series = {Mathematical Research}, volume = {96}, pages = {300--301}, publisher = {Akademie Verlag, Berlin}, year = {1996}, timestamp = {Mon, 18 Jun 2018 20:36:59 +0200}, biburl = {https://dblp.org/rec/conf/parcella/Gruska96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/napaw/GruskaM92, author = {Damas P. Gruska and Andrea Maggiolo{-}Schettini}, editor = {S. Purushothaman and Amy E. Zwarico}, title = {Process Communication Environment}, booktitle = {{NAPAW} 92, Proceedings of the First North American Process Algebra Workshop, Stony Brook, New York, USA, 28 Agust 1992}, series = {Workshops in Computing}, pages = {27--40}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/978-1-4471-3217-2\_3}, doi = {10.1007/978-1-4471-3217-2\_3}, timestamp = {Fri, 21 Jun 2019 13:08:59 +0200}, biburl = {https://dblp.org/rec/conf/napaw/GruskaM92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nato/Gruska92, author = {Damas P. Gruska}, editor = {Wolfgang A. Halang and Alexander D. Stoyenko}, title = {Real-Time Communication Networks}, booktitle = {Real Time Computing, Proceedings of the {NATO} Advanced Study Institute on Real Time Computing, held in Sint Maarten, Dutch Antilles, October 5-17, 1992}, series = {{NATO} {ASI} Series}, volume = {127}, pages = {691}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/978-3-642-88049-0\_109}, doi = {10.1007/978-3-642-88049-0\_109}, timestamp = {Fri, 12 May 2017 11:23:45 +0200}, biburl = {https://dblp.org/rec/conf/nato/Gruska92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/Gruska90, author = {Damas P. Gruska}, title = {Genomorphisms of Semi-Modular Lattices}, journal = {J. Comput. Syst. Sci.}, volume = {40}, number = {2}, pages = {182--187}, year = {1990}, url = {https://doi.org/10.1016/0022-0000(90)90011-9}, doi = {10.1016/0022-0000(90)90011-9}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/Gruska90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.