Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Rolando Trujillo-Rasua
@article{DBLP:journals/corr/abs-2401-06626, author = {Sergiu Bursuc and Reynaldo Gil Pons and Sjouke Mauw and Rolando Trujillo{-}Rasua}, title = {Software-Based Memory Erasure with relaxed isolation requirements: Extended Version}, journal = {CoRR}, volume = {abs/2401.06626}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.06626}, doi = {10.48550/ARXIV.2401.06626}, eprinttype = {arXiv}, eprint = {2401.06626}, timestamp = {Thu, 25 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-06626.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/PonsMT23, author = {Reynaldo Gil Pons and Sjouke Mauw and Rolando Trujillo{-}Rasua}, title = {On the optimal resistance against mafia and distance fraud in distance-bounding protocols}, journal = {Comput. Commun.}, volume = {210}, pages = {69--78}, year = {2023}, url = {https://doi.org/10.1016/j.comcom.2023.07.033}, doi = {10.1016/J.COMCOM.2023.07.033}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/PonsMT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bsci/Heikamp0DTR23, author = {Fokke Heikamp and Lei Pan and Robin Doss and Rolando Trujillo{-}Rasua and Sushmita Ruj}, editor = {Keke Gai and Kim{-}Kwang Raymond Choo}, title = {ForTrac: a Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness}, booktitle = {Proceedings of the 5th {ACM} International Symposium on Blockchain and Secure Critical Infrastructure, {BSCI} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {1--10}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3594556.3594608}, doi = {10.1145/3594556.3594608}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bsci/Heikamp0DTR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-13331, author = {Olga Gadyatskaya and Sjouke Mauw and Rolando Trujillo{-}Rasua and Tim A. C. Willemse}, title = {Automated generation of attack trees with optimal shape and labelling}, journal = {CoRR}, volume = {abs/2311.13331}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.13331}, doi = {10.48550/ARXIV.2311.13331}, eprinttype = {arXiv}, eprint = {2311.13331}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-13331.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/LaeuchliRT22, author = {Jesse Laeuchli and Yunior Ram{\'{\i}}rez{-}Cruz and Rolando Trujillo{-}Rasua}, title = {Analysis of centrality measures under differential privacy models}, journal = {Appl. Math. Comput.}, volume = {412}, pages = {126546}, year = {2022}, url = {https://doi.org/10.1016/j.amc.2021.126546}, doi = {10.1016/J.AMC.2021.126546}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/LaeuchliRT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SyedSTD22, author = {Naeem Firdous Syed and Syed W. Shah and Rolando Trujillo{-}Rasua and Robin Doss}, title = {Traceability in supply chains: {A} Cyber security analysis}, journal = {Comput. Secur.}, volume = {112}, pages = {102536}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102536}, doi = {10.1016/J.COSE.2021.102536}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SyedSTD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KumarKST22, author = {Rajesh Kumar and Rohan Kela and Siddhant Singh and Rolando Trujillo{-}Rasua}, title = {{APT} attacks on industrial control systems: {A} tale of three incidents}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {37}, pages = {100521}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100521}, doi = {10.1016/J.IJCIP.2022.100521}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/KumarKST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kais/MauwRT22, author = {Sjouke Mauw and Yunior Ram{\'{\i}}rez{-}Cruz and Rolando Trujillo{-}Rasua}, title = {Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation}, journal = {Knowl. Inf. Syst.}, volume = {64}, number = {4}, pages = {1077--1100}, year = {2022}, url = {https://doi.org/10.1007/s10115-022-01662-z}, doi = {10.1007/S10115-022-01662-Z}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kais/MauwRT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/PonsHMTT22, author = {Reynaldo Gil Pons and Ross Horne and Sjouke Mauw and Alwen Tiu and Rolando Trujillo{-}Rasua}, title = {Is Eve nearby? Analysing protocols under the distant-attacker assumption}, booktitle = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa, Israel, August 7-10, 2022}, pages = {17--32}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSF54842.2022.9919655}, doi = {10.1109/CSF54842.2022.9919655}, timestamp = {Fri, 11 Nov 2022 16:53:14 +0100}, biburl = {https://dblp.org/rec/conf/csfw/PonsHMTT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/HeikampPTRD22, author = {Fokke Heikamp and Lei Pan and Rolando Trujillo{-}Rasua and Sushmita Ruj and Robin Doss}, editor = {Xingliang Yuan and Guangdong Bai and Cristina Alcaraz and Suryadipta Majumdar}, title = {Forward Traceability for Product Authenticity Using Ethereum Smart Contracts}, booktitle = {Network and System Security - 16th International Conference, {NSS} 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13787}, pages = {514--523}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23020-2\_29}, doi = {10.1007/978-3-031-23020-2\_29}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/HeikampPTRD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Trujillo-Rasua21, author = {Rolando Trujillo{-}Rasua}, title = {Secure memory erasure in the presence of man-in-the-middle attackers}, journal = {J. Inf. Secur. Appl.}, volume = {57}, pages = {102730}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102730}, doi = {10.1016/J.JISA.2020.102730}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Trujillo-Rasua21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-03556, author = {Jesse Laeuchli and Yunior Ram{\'{\i}}rez{-}Cruz and Rolando Trujillo{-}Rasua}, title = {Analysis of centrality measures under differential privacy models}, journal = {CoRR}, volume = {abs/2103.03556}, year = {2021}, url = {https://arxiv.org/abs/2103.03556}, eprinttype = {arXiv}, eprint = {2103.03556}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-03556.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BuldasGLMT20, author = {Ahto Buldas and Olga Gadyatskaya and Aleksandr Lenin and Sjouke Mauw and Rolando Trujillo{-}Rasua}, title = {Attribute evaluation on attack trees with incomplete information}, journal = {Comput. Secur.}, volume = {88}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101630}, doi = {10.1016/J.COSE.2019.101630}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BuldasGLMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ZhuLTJX20, author = {Qingyi Zhu and Seng W. Loke and Rolando Trujillo{-}Rasua and Frank Jiang and Yong Xiang}, title = {Applications of Distributed Ledger Technologies to the Internet of Things: {A} Survey}, journal = {{ACM} Comput. Surv.}, volume = {52}, number = {6}, pages = {120:1--120:34}, year = {2020}, url = {https://doi.org/10.1145/3359982}, doi = {10.1145/3359982}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/ZhuLTJX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/DossTP20, author = {Robin Doss and Rolando Trujillo{-}Rasua and Selwyn Piramuthu}, title = {Secure attribute-based search in RFID-based inventory control systems}, journal = {Decis. Support Syst.}, volume = {132}, pages = {113270}, year = {2020}, url = {https://doi.org/10.1016/j.dss.2020.113270}, doi = {10.1016/J.DSS.2020.113270}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dss/DossTP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-05312, author = {Sjouke Mauw and Yunior Ram{\'{\i}}rez{-}Cruz and Rolando Trujillo{-}Rasua}, title = {Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation}, journal = {CoRR}, volume = {abs/2007.05312}, year = {2020}, url = {https://arxiv.org/abs/2007.05312}, eprinttype = {arXiv}, eprint = {2007.05312}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-05312.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/PonsRTY19, author = {Reynaldo Gil Pons and Yunior Ram{\'{\i}}rez{-}Cruz and Rolando Trujillo{-}Rasua and Ismael Gonz{\'{a}}lez Yero}, title = {Distance-based vertex identification in graphs: The outer multiset dimension}, journal = {Appl. Math. Comput.}, volume = {363}, year = {2019}, url = {https://doi.org/10.1016/j.amc.2019.124612}, doi = {10.1016/J.AMC.2019.124612}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amc/PonsRTY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/AvoineBBCHKKLMM19, author = {Gildas Avoine and Muhammed Ali Bing{\"{o}}l and Ioana Boureanu and Srdjan Capkun and Gerhard P. Hancke and S{\"{u}}leyman Kardas and Chong Hee Kim and C{\'{e}}dric Lauradoux and Benjamin Martin and Jorge Munilla and Alberto Peinado and Kasper Bonne Rasmussen and Dave Singel{\'{e}}e and Aslan Tchamkerten and Rolando Trujillo{-}Rasua and Serge Vaudenay}, title = {Security of Distance-Bounding: {A} Survey}, journal = {{ACM} Comput. Surv.}, volume = {51}, number = {5}, pages = {94:1--94:33}, year = {2019}, url = {https://doi.org/10.1145/3264628}, doi = {10.1145/3264628}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/AvoineBBCHKKLMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/datamine/MauwRT19, author = {Sjouke Mauw and Yunior Ram{\'{\i}}rez{-}Cruz and Rolando Trujillo{-}Rasua}, title = {Robust active attacks on social graphs}, journal = {Data Min. Knowl. Discov.}, volume = {33}, number = {5}, pages = {1357--1392}, year = {2019}, url = {https://doi.org/10.1007/s10618-019-00631-5}, doi = {10.1007/S10618-019-00631-5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/datamine/MauwRT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kais/MauwRT19, author = {Sjouke Mauw and Yunior Ram{\'{\i}}rez{-}Cruz and Rolando Trujillo{-}Rasua}, title = {Conditional adjacency anonymity in social graphs under active attacks}, journal = {Knowl. Inf. Syst.}, volume = {61}, number = {1}, pages = {485--511}, year = {2019}, url = {https://doi.org/10.1007/s10115-018-1283-x}, doi = {10.1007/S10115-018-1283-X}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kais/MauwRT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MauwSTT19, author = {Sjouke Mauw and Zach Smith and Jorge Toro{-}Pozo and Rolando Trujillo{-}Rasua}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Post-Collusion Security and Distance Bounding}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {941--958}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3345651}, doi = {10.1145/3319535.3345651}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MauwSTT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itnac/KangFVTH19, author = {James Jin Kang and Kiran Fahd and Sitalakshmi Venkatraman and Rolando Trujillo{-}Rasua and Paul S. Haskell{-}Dowland}, title = {Hybrid Routing for Man-in-the-Middle {(MITM)} Attack Detection in IoT Networks}, booktitle = {29th International Telecommunication Networks and Applications Conference, {ITNAC} 2019, Auckland, New Zealand, November 27-29, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ITNAC46935.2019.9077977}, doi = {10.1109/ITNAC46935.2019.9077977}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itnac/KangFVTH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-13474, author = {Rolando Trujillo{-}Rasua}, title = {Secure Memory Erasure in the Presence of Man-in-the-Middle Attackers}, journal = {CoRR}, volume = {abs/1905.13474}, year = {2019}, url = {http://arxiv.org/abs/1905.13474}, eprinttype = {arXiv}, eprint = {1905.13474}, timestamp = {Mon, 03 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-13474.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-03041, author = {Nicholas Charles Patterson and Rolando Trujillo{-}Rasua and Michael Hobbs and Guy Wood{-}Bradley and Judy Currey and Elicia Lanham}, title = {Chunked Lectures: {A} new model for conducting online lectures within Information Technology higher education}, journal = {CoRR}, volume = {abs/1909.03041}, year = {2019}, url = {http://arxiv.org/abs/1909.03041}, eprinttype = {arXiv}, eprint = {1909.03041}, timestamp = {Fri, 13 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-03041.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdp/MauwRT18, author = {Sjouke Mauw and Yunior Ram{\'{\i}}rez{-}Cruz and Rolando Trujillo{-}Rasua}, title = {Anonymising social graphs in the presence of active attackers}, journal = {Trans. Data Priv.}, volume = {11}, number = {2}, pages = {169--198}, year = {2018}, url = {http://www.tdp.cat/issues16/tdp.a285a17.pdf}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdp/MauwRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MauwSTT18, author = {Sjouke Mauw and Zach Smith and Jorge Toro{-}Pozo and Rolando Trujillo{-}Rasua}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Automated Identification of Desynchronisation Attacks on Shared Secrets}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {406--426}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_20}, doi = {10.1007/978-3-319-99073-6\_20}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MauwSTT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MauwSTT18, author = {Sjouke Mauw and Zach Smith and Jorge Toro{-}Pozo and Rolando Trujillo{-}Rasua}, title = {Distance-Bounding Protocols: Verification without Time and Location}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {549--566}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00001}, doi = {10.1109/SP.2018.00001}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MauwSTT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-10915, author = {Sjouke Mauw and Yunior Ram{\'{\i}}rez{-}Cruz and Rolando Trujillo{-}Rasua}, title = {Robust active attacks on social graphs}, journal = {CoRR}, volume = {abs/1811.10915}, year = {2018}, url = {http://arxiv.org/abs/1811.10915}, eprinttype = {arXiv}, eprint = {1811.10915}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-10915.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-10754, author = {Ahto Buldas and Olga Gadyatskaya and Aleksandr Lenin and Sjouke Mauw and Rolando Trujillo{-}Rasua}, title = {Attribute Evaluation on Attack Trees with Incomplete Information}, journal = {CoRR}, volume = {abs/1812.10754}, year = {2018}, url = {http://arxiv.org/abs/1812.10754}, eprinttype = {arXiv}, eprint = {1812.10754}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-10754.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/LemanskaRT17, author = {Magdalena Lemanska and Juan Alberto Rodr{\'{\i}}guez{-}Vel{\'{a}}zquez and Rolando Trujillo{-}Rasua}, title = {Similarities and Differences Between the Vertex Cover Number and the Weakly Connected Domination Number of a Graph}, journal = {Fundam. Informaticae}, volume = {152}, number = {3}, pages = {273--287}, year = {2017}, url = {https://doi.org/10.3233/FI-2017-1520}, doi = {10.3233/FI-2017-1520}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/LemanskaRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/GadyatskayaT17, author = {Olga Gadyatskaya and Rolando Trujillo{-}Rasua}, editor = {Peng Liu and Sjouke Mauw and Ketil St{\o}len}, title = {New Directions in Attack Tree Research: Catching up with Industrial Needs}, booktitle = {Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10744}, pages = {115--126}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-74860-3\_9}, doi = {10.1007/978-3-319-74860-3\_9}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/csfw/GadyatskayaT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GadyatskayaJMTW17, author = {Olga Gadyatskaya and Ravi Jhawar and Sjouke Mauw and Rolando Trujillo{-}Rasua and Tim A. C. Willemse}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Refinement-Aware Generation of Attack Trees}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {164--179}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_11}, doi = {10.1007/978-3-319-68063-7\_11}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/stm/GadyatskayaJMTW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MauwRT17, author = {Sjouke Mauw and Yunior Ram{\'{\i}}rez{-}Cruz and Rolando Trujillo{-}Rasua}, title = {Rethinking (k, {\unicode{120001}})-anonymity in social graphs: (k, {\unicode{120001}})-adjacency anonymity and (k, {\unicode{120001}})-(adjacency) anonymous transformations}, journal = {CoRR}, volume = {abs/1704.07078}, year = {2017}, url = {http://arxiv.org/abs/1704.07078}, eprinttype = {arXiv}, eprint = {1704.07078}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MauwRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Trujillo-RasuaY16, author = {Rolando Trujillo{-}Rasua and Ismael Gonz{\'{a}}lez Yero}, title = {Characterizing 1-Metric Antidimensional Trees and Unicyclic Graphs}, journal = {Comput. J.}, volume = {59}, number = {8}, pages = {1264--1273}, year = {2016}, url = {https://doi.org/10.1093/comjnl/bxw021}, doi = {10.1093/COMJNL/BXW021}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/Trujillo-RasuaY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Trujillo-RasuaY16, author = {Rolando Trujillo{-}Rasua and Ismael Gonz{\'{a}}lez Yero}, title = {k-Metric antidimension: {A} privacy measure for social graphs}, journal = {Inf. Sci.}, volume = {328}, pages = {403--417}, year = {2016}, url = {https://doi.org/10.1016/j.ins.2015.08.048}, doi = {10.1016/J.INS.2015.08.048}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/Trujillo-RasuaY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/TorresT16, author = {Christof Ferreira Torres and Rolando Trujillo{-}Rasua}, editor = {Silvio Ranise and Vipin Swarup}, title = {The Fr{\'{e}}chet/Manhattan Distance and the Trajectory Anonymisation Problem}, booktitle = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP} {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9766}, pages = {19--34}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-41483-6\_2}, doi = {10.1007/978-3-319-41483-6\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/TorresT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MauwTX16, author = {Sjouke Mauw and Rolando Trujillo{-}Rasua and Bochuan Xuan}, editor = {Silvio Ranise and Vipin Swarup}, title = {Counteracting Active Attacks in Social Network Graphs}, booktitle = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP} {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9766}, pages = {233--248}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-41483-6\_17}, doi = {10.1007/978-3-319-41483-6\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/MauwTX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/MauwTT16, author = {Sjouke Mauw and Jorge Toro{-}Pozo and Rolando Trujillo{-}Rasua}, title = {A Class of Precomputation-Based Distance-Bounding Protocols}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016}, pages = {97--111}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/EuroSP.2016.19}, doi = {10.1109/EUROSP.2016.19}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/MauwTT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip8-1/FraileFGKST16, author = {Marlon Fraile and Margaret Ford and Olga Gadyatskaya and Rajesh Kumar and Mari{\"{e}}lle Stoelinga and Rolando Trujillo{-}Rasua}, editor = {Jennifer Horkoff and Manfred A. Jeusfeld and Anne Persson}, title = {Using Attack-Defense Trees to Analyze Threats and Countermeasures in an {ATM:} {A} Case Study}, booktitle = {The Practice of Enterprise Modeling - 9th {IFIP} {WG} 8.1. Working Conference, PoEM 2016, Sk{\"{o}}vde, Sweden, November 8-10, 2016, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {267}, pages = {326--334}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48393-1\_24}, doi = {10.1007/978-3-319-48393-1\_24}, timestamp = {Sun, 25 Jul 2021 11:49:49 +0200}, biburl = {https://dblp.org/rec/conf/ifip8-1/FraileFGKST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qest/GadyatskayaJKLM16, author = {Olga Gadyatskaya and Ravi Jhawar and Piotr Kordy and Karim Lounis and Sjouke Mauw and Rolando Trujillo{-}Rasua}, editor = {Gul Agha and Benny Van Houdt}, title = {Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0}, booktitle = {Quantitative Evaluation of Systems - 13th International Conference, {QEST} 2016, Quebec City, QC, Canada, August 23-25, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9826}, pages = {159--162}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-43425-4\_10}, doi = {10.1007/978-3-319-43425-4\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/qest/GadyatskayaJKLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/MauwTT16, author = {Sjouke Mauw and Jorge Toro{-}Pozo and Rolando Trujillo{-}Rasua}, editor = {Gerhard P. Hancke and Konstantinos Markantonakis}, title = {Optimality Results on the Security of Lookup-Based Protocols}, booktitle = {Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10155}, pages = {137--150}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62024-4\_10}, doi = {10.1007/978-3-319-62024-4\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/MauwTT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JonkerMT16, author = {Hugo L. Jonker and Sjouke Mauw and Rolando Trujillo{-}Rasua}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {19--25}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_3}, doi = {10.1007/978-3-319-62033-6\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/JonkerMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/AvoineMT15, author = {Gildas Avoine and Sjouke Mauw and Rolando Trujillo{-}Rasua}, title = {Comparing distance bounding protocols: {A} critical mission supported by decision theory}, journal = {Comput. Commun.}, volume = {67}, pages = {92--102}, year = {2015}, url = {https://doi.org/10.1016/j.comcom.2015.06.007}, doi = {10.1016/J.COMCOM.2015.06.007}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/AvoineMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/JhawarKMRT15, author = {Ravi Jhawar and Barbara Kordy and Sjouke Mauw and Sasa Radomirovic and Rolando Trujillo{-}Rasua}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Attack Trees with Sequential Conjunction}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {339--353}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_23}, doi = {10.1007/978-3-319-18467-8\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/JhawarKMRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/Trujillo-RasuaD15, author = {Rolando Trujillo{-}Rasua and Josep Domingo{-}Ferrer}, editor = {Guillermo Navarro{-}Arribas and Vicen{\c{c}} Torra}, title = {Privacy in Spatio-Temporal Databases: {A} Microaggregation-Based Approach}, booktitle = {Advanced Research in Data Privacy}, series = {Studies in Computational Intelligence}, volume = {567}, pages = {197--214}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-09885-2\_11}, doi = {10.1007/978-3-319-09885-2\_11}, timestamp = {Tue, 07 May 2024 20:28:19 +0200}, biburl = {https://dblp.org/rec/series/sci/Trujillo-RasuaD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JhawarKMRT15, author = {Ravi Jhawar and Barbara Kordy and Sjouke Mauw and Sasa Radomirovic and Rolando Trujillo{-}Rasua}, title = {Attack Trees with Sequential Conjunction}, journal = {CoRR}, volume = {abs/1503.02261}, year = {2015}, url = {http://arxiv.org/abs/1503.02261}, eprinttype = {arXiv}, eprint = {1503.02261}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JhawarKMRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AvoineMT15, author = {Gildas Avoine and Sjouke Mauw and Rolando Trujillo{-}Rasua}, title = {Comparing Distance Bounding Protocols: a Critical Mission Supported by Decision Theory}, journal = {CoRR}, volume = {abs/1503.04593}, year = {2015}, url = {http://arxiv.org/abs/1503.04593}, eprinttype = {arXiv}, eprint = {1503.04593}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AvoineMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/Trujillo-Rasua0A14, author = {Rolando Trujillo{-}Rasua and Benjamin Martin and Gildas Avoine}, title = {Distance Bounding Facing Both Mafia and Distance Frauds}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {13}, number = {10}, pages = {5690--5698}, year = {2014}, url = {https://doi.org/10.1109/TWC.2014.2323979}, doi = {10.1109/TWC.2014.2323979}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/Trujillo-Rasua0A14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Trujillo-RasuaMA14, author = {Rolando Trujillo{-}Rasua and Benjamin Martin and Gildas Avoine}, title = {Distance-bounding facing both mafia and distance frauds: Technical report}, journal = {CoRR}, volume = {abs/1405.5704}, year = {2014}, url = {http://arxiv.org/abs/1405.5704}, eprinttype = {arXiv}, eprint = {1405.5704}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Trujillo-RasuaMA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Trujillo-RasuaY14, author = {Rolando Trujillo{-}Rasua and Ismael Gonz{\'{a}}lez Yero}, title = {k-Metric Antidimension: a Privacy Measure for Social Graphs}, journal = {CoRR}, volume = {abs/1408.2154}, year = {2014}, url = {http://arxiv.org/abs/1408.2154}, eprinttype = {arXiv}, eprint = {1408.2154}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Trujillo-RasuaY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Trujillo-Rasua14, author = {Rolando Trujillo{-}Rasua}, title = {Complexity of distance fraud attacks in graph-based distance bounding}, journal = {CoRR}, volume = {abs/1412.6016}, year = {2014}, url = {http://arxiv.org/abs/1412.6016}, eprinttype = {arXiv}, eprint = {1412.6016}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Trujillo-Rasua14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/is/Trujillo-RasuaD13, author = {Rolando Trujillo{-}Rasua and Josep Domingo{-}Ferrer}, title = {On the privacy offered by (k, {\(\delta\)})-anonymity}, journal = {Inf. Syst.}, volume = {38}, number = {4}, pages = {491--494}, year = {2013}, url = {https://doi.org/10.1016/j.is.2012.12.003}, doi = {10.1016/J.IS.2012.12.003}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/is/Trujillo-RasuaD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/Trujillo-Rasua13, author = {Rolando Trujillo{-}Rasua}, editor = {Ivan Stojmenovic and Zixue Cheng and Song Guo}, title = {Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding}, booktitle = {Mobile and Ubiquitous Systems: Computing, Networking, and Services - 10th International Conference, {MOBIQUITOUS} 2013, Tokyo, Japan, December 2-4, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {131}, pages = {289--302}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-11569-6\_23}, doi = {10.1007/978-3-319-11569-6\_23}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobiquitous/Trujillo-Rasua13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Trujillo-Rasua13, author = {Rolando Trujillo{-}Rasua}, title = {Privacy in {RFID} and mobile objects}, journal = {CoRR}, volume = {abs/1310.5476}, year = {2013}, url = {http://arxiv.org/abs/1310.5476}, eprinttype = {arXiv}, eprint = {1310.5476}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Trujillo-Rasua13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/es/Rasua12, author = {Rolando Trujillo{-}Rasua}, title = {Privacy in rfid and mobile objects}, school = {University of Rovira i Virgili, Spain}, year = {2012}, url = {http://hdl.handle.net/10803/86942}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/es/Rasua12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cii/Trujillo-RasuaSPD12, author = {Rolando Trujillo{-}Rasua and Agusti Solanas and Pablo A. P{\'{e}}rez{-}Mart{\'{\i}}nez and Josep Domingo{-}Ferrer}, title = {Predictive protocol for the scalable identification of {RFID} tags through collaborative readers}, journal = {Comput. Ind.}, volume = {63}, number = {6}, pages = {557--573}, year = {2012}, url = {https://doi.org/10.1016/j.compind.2012.03.005}, doi = {10.1016/J.COMPIND.2012.03.005}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cii/Trujillo-RasuaSPD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Domingo-FerrerT12, author = {Josep Domingo{-}Ferrer and Rolando Trujillo{-}Rasua}, title = {Microaggregation- and permutation-based anonymization of movement data}, journal = {Inf. Sci.}, volume = {208}, pages = {55--80}, year = {2012}, url = {https://doi.org/10.1016/j.ins.2012.04.015}, doi = {10.1016/J.INS.2012.04.015}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/Domingo-FerrerT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Trujillo-RasuaS11, author = {Rolando Trujillo{-}Rasua and Agusti Solanas}, title = {Efficient probabilistic communication protocol for the private identification of {RFID} tags by means of collaborative readers}, journal = {Comput. Networks}, volume = {55}, number = {15}, pages = {3211--3223}, year = {2011}, url = {https://doi.org/10.1016/j.comnet.2011.05.013}, doi = {10.1016/J.COMNET.2011.05.013}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Trujillo-RasuaS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/Fernandez-MirTCD11, author = {Albert Fern{\`{a}}ndez{-}Mir and Rolando Trujillo{-}Rasua and Jordi Castell{\`{a}}{-}Roca and Josep Domingo{-}Ferrer}, editor = {Ari Juels and Christof Paar}, title = {A Scalable {RFID} Authentication Protocol Supporting Ownership Transfer and Controlled Delegation}, booktitle = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7055}, pages = {147--162}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25286-0\_10}, doi = {10.1007/978-3-642-25286-0\_10}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rfidsec/Fernandez-MirTCD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidta/Trujillo-RasuaS11, author = {Rolando Trujillo{-}Rasua and Agusti Solanas}, title = {Scalable trajectory-based protocol for {RFID} tags identification}, booktitle = {2011 {IEEE} International Conference on RFID-Technologies and Applications, {RFID-TA} 2011, Sitges, Spain, September 15-16, 2011}, pages = {279--285}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/RFID-TA.2011.6068650}, doi = {10.1109/RFID-TA.2011.6068650}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/rfidta/Trujillo-RasuaS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gis/Domingo-FerrerST10, author = {Josep Domingo{-}Ferrer and Michal Sramka and Rolando Trujillo{-}Rasua}, editor = {Elisa Bertino and Maria Luisa Damiani and Y{\"{u}}cel Saygin}, title = {Privacy-preserving publication of trajectories using microaggregation}, booktitle = {Proceedings of the 3rd {ACM} {SIGSPATIAL} International Workshop on Security and Privacy in {GIS} and LBS, {SPRINGL} 2010, November 2, 2010, San Jose, California, USA, Proceedings}, pages = {26--33}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1868470.1868478}, doi = {10.1145/1868470.1868478}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gis/Domingo-FerrerST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/Trujillo-RasuaMA10, author = {Rolando Trujillo{-}Rasua and Benjamin Martin and Gildas Avoine}, editor = {Siddika Berna {\"{O}}rs Yal{\c{c}}in}, title = {The Poulidor Distance-Bounding Protocol}, booktitle = {Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6370}, pages = {239--257}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16822-2\_19}, doi = {10.1007/978-3-642-16822-2\_19}, timestamp = {Fri, 03 Sep 2021 17:40:55 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/Trujillo-RasuaMA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/antsw/ManiezzoRGGOT08, author = {Vittorio Maniezzo and Matteo Roffilli and Roberto Gabrielli and Alessandra Guidazzi and Manuel Otero and Rolando Trujillo{-}Rasua}, editor = {Marco Dorigo and Mauro Birattari and Christian Blum and Maurice Clerc and Thomas St{\"{u}}tzle and Alan F. T. Winfield}, title = {Regional Traffic Assignment by {ACO}}, booktitle = {Ant Colony Optimization and Swarm Intelligence, 6th International Conference, {ANTS} 2008, Brussels, Belgium, September 22-24, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5217}, pages = {409--410}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87527-7\_49}, doi = {10.1007/978-3-540-87527-7\_49}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/antsw/ManiezzoRGGOT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.