BibTeX records: Damas P. Gruska

download as .bib file

@inproceedings{DBLP:conf/ccwc/AliG22,
  author       = {Aliyu Tanko Ali and
                  Damas P. Gruska},
  title        = {States of Attack Under Incomplete Information},
  booktitle    = {12th {IEEE} Annual Computing and Communication Workshop and Conference,
                  {CCWC} 2022, Las Vegas, NV, USA, January 26-29, 2022},
  pages        = {801--807},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CCWC54503.2022.9720758},
  doi          = {10.1109/CCWC54503.2022.9720758},
  timestamp    = {Tue, 08 Mar 2022 13:12:40 +0100},
  biburl       = {https://dblp.org/rec/conf/ccwc/AliG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/BarbutiBGGLM21,
  author       = {Roberto Barbuti and
                  Pasquale Bove and
                  Roberta Gori and
                  Damas P. Gruska and
                  Francesca Levi and
                  Paolo Milazzo},
  title        = {Encoding Threshold Boolean Networks into Reaction Systems for the
                  Analysis of Gene Regulatory Networks},
  journal      = {Fundam. Informaticae},
  volume       = {179},
  number       = {2},
  pages        = {205--225},
  year         = {2021},
  url          = {https://doi.org/10.3233/FI-2021-2021},
  doi          = {10.3233/FI-2021-2021},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/BarbutiBGGLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csp/GruskaR21,
  author       = {Damas P. Gruska and
                  M. Carmen Ruiz},
  editor       = {Holger Schlingloff and
                  Thomas Vogel},
  title        = {Process Opacity and Insertion Functions},
  booktitle    = {Proceedings of the 29th International Workshop on Concurrency, Specification
                  and Programming (CS{\&}P 2021), Berlin, Germany, September 27-28,
                  2021},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2951},
  pages        = {83--92},
  publisher    = {CEUR-WS.org},
  year         = {2021},
  url          = {https://ceur-ws.org/Vol-2951/paper7.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:14 +0100},
  biburl       = {https://dblp.org/rec/conf/csp/GruskaR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csp/AliG21,
  author       = {Aliyu Tanko Ali and
                  Damas P. Gruska},
  editor       = {Holger Schlingloff and
                  Thomas Vogel},
  title        = {Attack Trees with Time Constraints},
  booktitle    = {Proceedings of the 29th International Workshop on Concurrency, Specification
                  and Programming (CS{\&}P 2021), Berlin, Germany, September 27-28,
                  2021},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2951},
  pages        = {93--105},
  publisher    = {CEUR-WS.org},
  year         = {2021},
  url          = {https://ceur-ws.org/Vol-2951/paper5.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csp/AliG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csp/Gruska21,
  author       = {Damas P. Gruska},
  editor       = {Bernd{-}Holger Schlingloff and
                  Thomas Vogel and
                  Andrzej Skowron},
  title        = {Security Enforcing},
  booktitle    = {Concurrency, Specification and Programming - Revised Selected Papers
                  from the 29th International Workshop on Concurrency, Specification
                  and Programming (CS{\&}P'21), Berlin, Germany},
  series       = {Studies in Computational Intelligence},
  volume       = {1091},
  pages        = {123--143},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-26651-5\_6},
  doi          = {10.1007/978-3-031-26651-5\_6},
  timestamp    = {Tue, 09 May 2023 15:20:42 +0200},
  biburl       = {https://dblp.org/rec/conf/csp/Gruska21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gandalf/AliG21,
  author       = {Aliyu Tanko Ali and
                  Damas P. Gruska},
  editor       = {Dario Della Monica and
                  Gian Luca Pozzato and
                  Enrico Scala},
  title        = {Dynamic Attack Trees},
  booktitle    = {Proceedings of the 3rd Workshop on Artificial Intelligence and Formal
                  Verification, Logic, Automata, and Synthesis hosted by the Twelfth
                  International Symposium on Games, Automata, Logics, and Formal Verification
                  (GandALF 2021), Padua, Italy, September 22, 2021},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2987},
  pages        = {25--29},
  publisher    = {CEUR-WS.org},
  year         = {2021},
  url          = {https://ceur-ws.org/Vol-2987/paper5.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:43 +0100},
  biburl       = {https://dblp.org/rec/conf/gandalf/AliG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/medi/Gruska21,
  author       = {Damas P. Gruska},
  editor       = {Ladjel Bellatreche and
                  George A. Chernishev and
                  Antonio Corral and
                  Samir Ouchani and
                  J{\"{u}}ri Vain},
  title        = {Time Insertion Functions},
  booktitle    = {Advances in Model and Data Engineering in the Digitalization Era -
                  {MEDI} 2021 International Workshops: DETECT, SIAS, CSMML, BIOC, HEDA,
                  Tallinn, Estonia, June 21-23, 2021, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1481},
  pages        = {181--188},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-87657-9\_14},
  doi          = {10.1007/978-3-030-87657-9\_14},
  timestamp    = {Thu, 07 Oct 2021 16:53:29 +0200},
  biburl       = {https://dblp.org/rec/conf/medi/Gruska21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uemcom/AliG21,
  author       = {Aliyu Tanko Ali and
                  Damas P. Gruska},
  title        = {Reversible Attack Trees},
  booktitle    = {12th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile
                  Communication Conference, {UEMCON} 2021, New York, NY, USA, December
                  1-4, 2021},
  pages        = {279--285},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/UEMCON53757.2021.9666564},
  doi          = {10.1109/UEMCON53757.2021.9666564},
  timestamp    = {Tue, 18 Jan 2022 17:38:45 +0100},
  biburl       = {https://dblp.org/rec/conf/uemcom/AliG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/GoriGM19,
  author       = {Roberta Gori and
                  Damas P. Gruska and
                  Paolo Milazzo},
  title        = {Studying Opacity of Reaction Systems through Formula Based Predictors},
  journal      = {Fundam. Informaticae},
  volume       = {165},
  number       = {3-4},
  pages        = {303--319},
  year         = {2019},
  url          = {https://doi.org/10.3233/FI-2019-1787},
  doi          = {10.3233/FI-2019-1787},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/GoriGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csp/AliG19,
  author       = {Aliyu Tanko Ali and
                  Damas P. Gruska},
  editor       = {Krzysztof Ropiak and
                  Lech Polkowski and
                  Piotr Artiemjew},
  title        = {Attack Protection Tree},
  booktitle    = {Proceedings of the 28th International Workshop on Concurrency, Specification
                  and Programming, Olsztyn, Poland, September 24-26th, 2019},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2571},
  publisher    = {CEUR-WS.org},
  year         = {2019},
  url          = {https://ceur-ws.org/Vol-2571/CSP2019\_paper\_7.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:14 +0100},
  biburl       = {https://dblp.org/rec/conf/csp/AliG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csp/GruskaR19,
  author       = {Damas P. Gruska and
                  M. Carmen Ruiz},
  editor       = {Krzysztof Ropiak and
                  Lech Polkowski and
                  Piotr Artiemjew},
  title        = {Observations, Testing and Security},
  booktitle    = {Proceedings of the 28th International Workshop on Concurrency, Specification
                  and Programming, Olsztyn, Poland, September 24-26th, 2019},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2571},
  publisher    = {CEUR-WS.org},
  year         = {2019},
  url          = {https://ceur-ws.org/Vol-2571/CSP2019\_paper\_6.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csp/GruskaR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/GruskaR19,
  author       = {Damas P. Gruska and
                  M. Carmen Ruiz},
  editor       = {Jo{\~{a}}o M. F. Rodrigues and
                  Pedro J. S. Cardoso and
                  J{\^{a}}nio M. Monteiro and
                  Roberto Lam and
                  Valeria V. Krzhizhanovskaya and
                  Michael Harold Lees and
                  Jack J. Dongarra and
                  Peter M. A. Sloot},
  title        = {Security of Low Level IoT Protocols},
  booktitle    = {Computational Science - {ICCS} 2019 - 19th International Conference,
                  Faro, Portugal, June 12-14, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11538},
  pages        = {621--633},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22744-9\_48},
  doi          = {10.1007/978-3-030-22744-9\_48},
  timestamp    = {Tue, 07 May 2024 20:07:42 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/GruskaR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwann/GruskaR19,
  author       = {Damas P. Gruska and
                  M. Carmen Ruiz},
  editor       = {Ignacio Rojas and
                  Gonzalo Joya and
                  Andreu Catal{\`{a}}},
  title        = {Security Testing for Multi-Agent Systems},
  booktitle    = {Advances in Computational Intelligence - 15th International Work-Conference
                  on Artificial Neural Networks, {IWANN} 2019, Gran Canaria, Spain,
                  June 12-14, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11506},
  pages        = {703--715},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-20521-8\_58},
  doi          = {10.1007/978-3-030-20521-8\_58},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwann/GruskaR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/Gruska19,
  author       = {Damas P. Gruska},
  editor       = {Yannis Manolopoulos and
                  George Angelos Papadopoulos and
                  Athena Stassopoulou and
                  Ioanna Dionysiou and
                  Ioannis Kyriakides and
                  Nicolas Tsapatsoulis},
  title        = {Security and time insertion},
  booktitle    = {Proceedings of the 23rd Pan-Hellenic Conference on Informatics, {PCI}
                  2019, Nicosia, Cyprus, November 28-30, 2019},
  pages        = {154--157},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3368640.3368668},
  doi          = {10.1145/3368640.3368668},
  timestamp    = {Sun, 08 Dec 2019 13:58:41 +0100},
  biburl       = {https://dblp.org/rec/conf/pci/Gruska19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartiot/RuizGGOHR19,
  author       = {M. Carmen Ruiz and
                  Celia Garrido{-}Hidalgo and
                  Damas P. Gruska and
                  Teresa Olivares and
                  Diego Hortelano and
                  Luis Roda{-}Sanchez},
  title        = {Modeling and Evaluation of a Power-Aware Algorithm for IoT Bluetooth
                  Low Energy Devices},
  booktitle    = {2019 {IEEE} International Conference on Smart Internet of Things (SmartIoT),
                  Tianjin, China, August 9-11, 2019},
  pages        = {28--35},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SmartIoT.2019.00014},
  doi          = {10.1109/SMARTIOT.2019.00014},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smartiot/RuizGGOHR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csp/GoriGM18,
  author       = {Roberta Gori and
                  Damas P. Gruska and
                  Paolo Milazzo},
  editor       = {Bernd{-}Holger Schlingloff and
                  Samira Akili},
  title        = {Hidden States in Reaction Systems},
  booktitle    = {Proceedings of the 27th International Workshop on Concurrency, Specification
                  and Programming, Berlin, Germany, September 24-26, 2018},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2240},
  publisher    = {CEUR-WS.org},
  year         = {2018},
  url          = {https://ceur-ws.org/Vol-2240/paper12.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:14 +0100},
  biburl       = {https://dblp.org/rec/conf/csp/GoriGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csp/GruskaR18,
  author       = {Damas P. Gruska and
                  M. Carmen Ruiz},
  editor       = {Bernd{-}Holger Schlingloff and
                  Samira Akili},
  title        = {Opacity-enforcing for Process Algebras},
  booktitle    = {Proceedings of the 27th International Workshop on Concurrency, Specification
                  and Programming, Berlin, Germany, September 24-26, 2018},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2240},
  publisher    = {CEUR-WS.org},
  year         = {2018},
  url          = {https://ceur-ws.org/Vol-2240/paper1.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csp/GruskaR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/Gruska16,
  author       = {Damas P. Gruska},
  title        = {Differential Privacy and Security},
  journal      = {Fundam. Informaticae},
  volume       = {143},
  number       = {1-2},
  pages        = {73--87},
  year         = {2016},
  url          = {https://doi.org/10.3233/FI-2016-1304},
  doi          = {10.3233/FI-2016-1304},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/Gruska16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csp/PatakyG16,
  author       = {Mikul{\'{a}}s Pataky and
                  Damas P. Gruska},
  editor       = {Bernd{-}Holger Schlingloff},
  title        = {Analysing of {M-AHIDS} with Future States on {DARPA} and {KDD99} Benchmarks},
  booktitle    = {Proceedings of the 25th International Workshop on Concurrency, Specification
                  and Programming, Rostock, Germany, September 28-30, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1698},
  pages        = {153--164},
  publisher    = {CEUR-WS.org},
  year         = {2016},
  url          = {https://ceur-ws.org/Vol-1698/CS\&\#38;P2016\_14\_Pataky\&\#38;Gruska\_Analysing-of-M-AHIDS-with-future-states-on-DARPA-and-KDD99-benchmarks.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:14 +0100},
  biburl       = {https://dblp.org/rec/conf/csp/PatakyG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csp/Gruska16,
  author       = {Damas P. Gruska},
  editor       = {Bernd{-}Holger Schlingloff},
  title        = {Process Environment Opacity},
  booktitle    = {Proceedings of the 25th International Workshop on Concurrency, Specification
                  and Programming, Rostock, Germany, September 28-30, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1698},
  pages        = {209--220},
  publisher    = {CEUR-WS.org},
  year         = {2016},
  url          = {https://ceur-ws.org/Vol-1698/CS\&\#38;P2016\_20\_Gruska\_Process-Environment-Opacity.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csp/Gruska16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csp/Gruska15,
  author       = {Damas P. Gruska},
  editor       = {Zbigniew Suraj and
                  Ludwik Czaja},
  title        = {Gained and Excluded Classified Actions by Dynamic Security Policies},
  booktitle    = {Proceedings of the 24th International Workshop on Concurrency, Specification
                  and Programming, Rzeszow, Poland, September 28-30, 2015},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1492},
  pages        = {170--181},
  publisher    = {CEUR-WS.org},
  year         = {2015},
  url          = {https://ceur-ws.org/Vol-1492/Paper\_16.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:14 +0100},
  biburl       = {https://dblp.org/rec/conf/csp/Gruska15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csp/KovacG15,
  author       = {Michal Kov{\'{a}}c and
                  Damas P. Gruska},
  editor       = {Zbigniew Suraj and
                  Ludwik Czaja},
  title        = {Sequential {P} Systems with Active Membranes Working on Sets},
  booktitle    = {Proceedings of the 24th International Workshop on Concurrency, Specification
                  and Programming, Rzeszow, Poland, September 28-30, 2015},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1492},
  pages        = {247--257},
  publisher    = {CEUR-WS.org},
  year         = {2015},
  url          = {https://ceur-ws.org/Vol-1492/Paper\_24.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csp/KovacG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ershov/Gruska15,
  author       = {Damas P. Gruska},
  editor       = {Manuel Mazzara and
                  Andrei Voronkov},
  title        = {Dynamics Security Policies and Process Opacity for Timed Process Algebras},
  booktitle    = {Perspectives of System Informatics - 10th International Andrei Ershov
                  Informatics Conference, {PSI} 2015, in Memory of Helmut Veith, Kazan
                  and Innopolis, Russia, August 24-27, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9609},
  pages        = {149--157},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-41579-6\_12},
  doi          = {10.1007/978-3-319-41579-6\_12},
  timestamp    = {Sun, 02 Jun 2019 21:19:59 +0200},
  biburl       = {https://dblp.org/rec/conf/ershov/Gruska15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/Gruska14,
  author       = {Damas P. Gruska},
  title        = {Simulation Opacity},
  journal      = {Fundam. Informaticae},
  volume       = {133},
  number       = {2-3},
  pages        = {165--179},
  year         = {2014},
  url          = {https://doi.org/10.3233/FI-2014-1069},
  doi          = {10.3233/FI-2014-1069},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/Gruska14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csp/Gruska14,
  author       = {Damas P. Gruska},
  editor       = {Louchka Popova{-}Zeugmann},
  title        = {Differential Privacy and Security},
  booktitle    = {Proceedings of the 23th International Workshop on Concurrency, Specification
                  and Programming, Chemnitz, Germany, September 29 - October 1, 2014},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1269},
  pages        = {80--91},
  publisher    = {CEUR-WS.org},
  year         = {2014},
  url          = {https://ceur-ws.org/Vol-1269/paper80.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:14 +0100},
  biburl       = {https://dblp.org/rec/conf/csp/Gruska14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csp/PatakyG14,
  author       = {Mikul{\'{a}}s Pataky and
                  Damas P. Gruska},
  editor       = {Louchka Popova{-}Zeugmann},
  title        = {Multi-Agent Heterogeneous Intrusion Detection System},
  booktitle    = {Proceedings of the 23th International Workshop on Concurrency, Specification
                  and Programming, Chemnitz, Germany, September 29 - October 1, 2014},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1269},
  pages        = {184--195},
  publisher    = {CEUR-WS.org},
  year         = {2014},
  url          = {https://ceur-ws.org/Vol-1269/paper184.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csp/PatakyG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ershov/Gruska14,
  author       = {Damas P. Gruska},
  editor       = {Andrei Voronkov and
                  Irina B. Virbitskaite},
  title        = {Process Opacity for Timed Process Algebra},
  booktitle    = {Perspectives of System Informatics - 9th International Ershov Informatics
                  Conference, {PSI} 2014, St. Petersburg, Russia, June 24-27, 2014.
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8974},
  pages        = {151--160},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46823-4\_13},
  doi          = {10.1007/978-3-662-46823-4\_13},
  timestamp    = {Mon, 16 Dec 2019 13:26:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ershov/Gruska14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/Gruska13,
  author       = {Damas P. Gruska},
  title        = {Information Flow Testing},
  journal      = {Fundam. Informaticae},
  volume       = {128},
  number       = {1-2},
  pages        = {81--95},
  year         = {2013},
  url          = {https://doi.org/10.3233/FI-2013-934},
  doi          = {10.3233/FI-2013-934},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/Gruska13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csp/Gruska13,
  author       = {Damas P. Gruska},
  editor       = {Marcin S. Szczuka and
                  Ludwik Czaja and
                  Magdalena Kacprzak},
  title        = {Opacity Testing},
  booktitle    = {Proceedings of the 22nd International Workshop on Concurrency, Specification
                  and Programming, Warsaw, Poland},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1032},
  pages        = {169--180},
  publisher    = {CEUR-WS.org},
  year         = {2013},
  url          = {https://ceur-ws.org/Vol-1032/paper-15.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:14 +0100},
  biburl       = {https://dblp.org/rec/conf/csp/Gruska13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/Gruska12,
  author       = {Damas P. Gruska},
  title        = {Informational Analysis of Security and Integrity},
  journal      = {Fundam. Informaticae},
  volume       = {120},
  number       = {3-4},
  pages        = {295--309},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2012-763},
  doi          = {10.3233/FI-2012-763},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/Gruska12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/Gruska12a,
  author       = {Damas P. Gruska},
  title        = {Quantification of Positive and Negative Attacker's Information},
  journal      = {Fundam. Informaticae},
  volume       = {120},
  number       = {3-4},
  pages        = {311--324},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2012-764},
  doi          = {10.3233/FI-2012-764},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/Gruska12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csp/Gruska12,
  author       = {Damas P. Gruska},
  editor       = {Louchka Popova{-}Zeugmann},
  title        = {Information Flow and Concurrent Imperative Languages},
  booktitle    = {Proceedings of the 21th International Workshop on Concurrency, Specification
                  and Programming, Berlin, Germany, September 26-28, 2012},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {928},
  pages        = {123--134},
  publisher    = {CEUR-WS.org},
  year         = {2012},
  url          = {https://ceur-ws.org/Vol-928/0123.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:14 +0100},
  biburl       = {https://dblp.org/rec/conf/csp/Gruska12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csp/Gruska12a,
  author       = {Damas P. Gruska},
  editor       = {Louchka Popova{-}Zeugmann},
  title        = {Test Based Security},
  booktitle    = {Proceedings of the 21th International Workshop on Concurrency, Specification
                  and Programming, Berlin, Germany, September 26-28, 2012},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {928},
  pages        = {135--146},
  publisher    = {CEUR-WS.org},
  year         = {2012},
  url          = {https://ceur-ws.org/Vol-928/0135.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csp/Gruska12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/Gruska11,
  author       = {Damas P. Gruska},
  title        = {Gained and Excluded Private Actions by Process Observations},
  journal      = {Fundam. Informaticae},
  volume       = {109},
  number       = {3},
  pages        = {281--295},
  year         = {2011},
  url          = {https://doi.org/10.3233/FI-2011-511},
  doi          = {10.3233/FI-2011-511},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/Gruska11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/BarbutiMMG10,
  author       = {Roberto Barbuti and
                  Andrea Maggiolo{-}Schettini and
                  Paolo Milazzo and
                  Damas P. Gruska},
  title        = {A Notion of Biological Diagnosability Inspired by the Notion of Opacity
                  in Systems Security},
  journal      = {Fundam. Informaticae},
  volume       = {102},
  number       = {1},
  pages        = {19--34},
  year         = {2010},
  url          = {https://doi.org/10.3233/FI-2010-294},
  doi          = {10.3233/FI-2010-294},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/BarbutiMMG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/Gruska10,
  author       = {Damas P. Gruska},
  title        = {Process Algebra Contexts and Security Properties},
  journal      = {Fundam. Informaticae},
  volume       = {102},
  number       = {1},
  pages        = {63--76},
  year         = {2010},
  url          = {https://doi.org/10.3233/FI-2010-297},
  doi          = {10.3233/FI-2010-297},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/Gruska10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bionetics/Gruska10,
  author       = {Damas P. Gruska},
  editor       = {Junichi Suzuki and
                  Tadashi Nakano},
  title        = {Diagnosability of Nested Intruders},
  booktitle    = {Bio-Inspired Models of Network, Information, and Computing Systems
                  - 5th International {ICST} Conference, {BIONETICS} 2010, Boston, MA,
                  USA, December 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {87},
  pages        = {92--99},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-32615-8\_12},
  doi          = {10.1007/978-3-642-32615-8\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bionetics/Gruska10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/Gruska09,
  author       = {Damas P. Gruska},
  title        = {Quantifying Security for Timed Process Algebras},
  journal      = {Fundam. Informaticae},
  volume       = {93},
  number       = {1-3},
  pages        = {155--169},
  year         = {2009},
  url          = {https://doi.org/10.3233/FI-2009-0094},
  doi          = {10.3233/FI-2009-0094},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/Gruska09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/Gruska08,
  author       = {Damas P. Gruska},
  title        = {Probabilistic Information Flow Security},
  journal      = {Fundam. Informaticae},
  volume       = {85},
  number       = {1-4},
  pages        = {173--187},
  year         = {2008},
  url          = {http://content.iospress.com/articles/fundamenta-informaticae/fi85-1-4-13},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/Gruska08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/GruskaMM08,
  author       = {Damas P. Gruska and
                  Andrea Maggiolo{-}Schettini and
                  Paolo Milazzo},
  title        = {Security in a Model for Long-running Transactions},
  journal      = {Fundam. Informaticae},
  volume       = {85},
  number       = {1-4},
  pages        = {189--203},
  year         = {2008},
  url          = {http://content.iospress.com/articles/fundamenta-informaticae/fi85-1-4-14},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/GruskaMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/Gruska07,
  author       = {Damas P. Gruska},
  title        = {Observation Based System Security},
  journal      = {Fundam. Informaticae},
  volume       = {79},
  number       = {3-4},
  pages        = {335--346},
  year         = {2007},
  url          = {http://content.iospress.com/articles/fundamenta-informaticae/fi79-3-4-07},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/Gruska07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/Gruska06,
  author       = {Damas P. Gruska},
  title        = {Network Information Flow},
  journal      = {Fundam. Informaticae},
  volume       = {72},
  number       = {1-3},
  pages        = {167--180},
  year         = {2006},
  url          = {http://content.iospress.com/articles/fundamenta-informaticae/fi72-1-3-13},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/Gruska06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ershov/Gruska06,
  author       = {Damas P. Gruska},
  editor       = {Irina B. Virbitskaite and
                  Andrei Voronkov},
  title        = {Information-Flow Attacks Based on Limited Observations},
  booktitle    = {Perspectives of Systems Informatics, 6th International Andrei Ershov
                  Memorial Conference, {PSI} 2006, Novosibirsk, Russia, June 27-30,
                  2006. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4378},
  pages        = {223--234},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-70881-0\_20},
  doi          = {10.1007/978-3-540-70881-0\_20},
  timestamp    = {Mon, 16 Dec 2019 13:26:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ershov/Gruska06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/GruskaM01,
  author       = {Damas P. Gruska and
                  Andrea Maggiolo{-}Schettini},
  title        = {Process Algebras for Network Communication},
  journal      = {Fundam. Informaticae},
  volume       = {45},
  number       = {4},
  pages        = {359--378},
  year         = {2001},
  url          = {http://content.iospress.com/articles/fundamenta-informaticae/fi45-4-04},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/GruskaM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fct/Gruska97,
  author       = {Damas P. Gruska},
  editor       = {Bogdan S. Chlebus and
                  Ludwik Czaja},
  title        = {Bounded Concurrency},
  booktitle    = {Fundamentals of Computation Theory, 11th International Symposium,
                  {FCT} '97, Krak{\'{o}}w, Poland, September 1-3, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1279},
  pages        = {198--209},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0036184},
  doi          = {10.1007/BFB0036184},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fct/Gruska97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/parcella/Gruska96,
  author       = {Damas P. Gruska},
  editor       = {Roland Vollmar and
                  Werner Erhard and
                  Vesselin Iossifov},
  title        = {Process Algebra for Shared Ressources},
  booktitle    = {Parcella 1996, {VII.} International Workshop on Parallel Processing
                  by Cellular Automata and Arrays, Berlin, Germany, September 16-20,
                  1996, Proceedings},
  series       = {Mathematical Research},
  volume       = {96},
  pages        = {300--301},
  publisher    = {Akademie Verlag, Berlin},
  year         = {1996},
  timestamp    = {Mon, 18 Jun 2018 20:36:59 +0200},
  biburl       = {https://dblp.org/rec/conf/parcella/Gruska96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/napaw/GruskaM92,
  author       = {Damas P. Gruska and
                  Andrea Maggiolo{-}Schettini},
  editor       = {S. Purushothaman and
                  Amy E. Zwarico},
  title        = {Process Communication Environment},
  booktitle    = {{NAPAW} 92, Proceedings of the First North American Process Algebra
                  Workshop, Stony Brook, New York, USA, 28 Agust 1992},
  series       = {Workshops in Computing},
  pages        = {27--40},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/978-1-4471-3217-2\_3},
  doi          = {10.1007/978-1-4471-3217-2\_3},
  timestamp    = {Fri, 21 Jun 2019 13:08:59 +0200},
  biburl       = {https://dblp.org/rec/conf/napaw/GruskaM92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nato/Gruska92,
  author       = {Damas P. Gruska},
  editor       = {Wolfgang A. Halang and
                  Alexander D. Stoyenko},
  title        = {Real-Time Communication Networks},
  booktitle    = {Real Time Computing, Proceedings of the {NATO} Advanced Study Institute
                  on Real Time Computing, held in Sint Maarten, Dutch Antilles, October
                  5-17, 1992},
  series       = {{NATO} {ASI} Series},
  volume       = {127},
  pages        = {691},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/978-3-642-88049-0\_109},
  doi          = {10.1007/978-3-642-88049-0\_109},
  timestamp    = {Fri, 12 May 2017 11:23:45 +0200},
  biburl       = {https://dblp.org/rec/conf/nato/Gruska92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/Gruska90,
  author       = {Damas P. Gruska},
  title        = {Genomorphisms of Semi-Modular Lattices},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {40},
  number       = {2},
  pages        = {182--187},
  year         = {1990},
  url          = {https://doi.org/10.1016/0022-0000(90)90011-9},
  doi          = {10.1016/0022-0000(90)90011-9},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/Gruska90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics