default search action
Mauricio Papa
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2016
- [j8]Jeyasingam Nivethan, Mauricio Papa:
On the use of open-source firewalls in ICS/SCADA systems. Inf. Secur. J. A Glob. Perspect. 25(1-3): 83-93 (2016) - 2012
- [j7]Anastasia Mavridou, Victor Zhou, Jerald Dawkins, Mauricio Papa:
A situational awareness framework for securing the smart grid using monitoring sensors and threat models. Int. J. Electron. Secur. Digit. Forensics 4(2/3): 138-153 (2012) - [j6]Peter J. Hawrylak, Nakeisha Schimke, John Hale, Mauricio Papa:
Security Risks Associated with Radio Frequency Identification in Medical Environments. J. Medical Syst. 36(6): 3491-3505 (2012) - 2008
- [j5]Peter Huitsing, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi:
Attack taxonomies for the Modbus protocols. Int. J. Crit. Infrastructure Prot. 1: 37-44 (2008) - [j4]Tim Kilpatrick, Jesús González, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi:
Forensic analysis of SCADA systems and networks. Int. J. Secur. Networks 3(2): 95-102 (2008) - 2005
- [j3]Jerald Dawkins, K. Clark, Gavin Manes, Mauricio Papa:
A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks. J. Netw. Syst. Manag. 13(3): 253-267 (2005) - 2003
- [j2]John Hale, Mauricio Papa, Sujeet Shenoi:
Programmable Access Control. J. Comput. Secur. 11(3): 331-352 (2003) - 2001
- [j1]Mauricio Papa, Jason Wood, Sujeet Shenoi:
Evaluating controller robustness using cell mapping. Fuzzy Sets Syst. 121(1): 3-12 (2001)
Conference and Workshop Papers
- 2024
- [c39]Alex Howe, Dale Peasley, Mauricio Papa:
Graph Autoencoders for Detecting Anomalous Intrusions in OT Networks Through Dynamic Link Detection. CCNC 2024: 1-6 - 2023
- [c38]Alex Howe, Mauricio Papa:
Feature Engineering in Machine Learning-Based Intrusion Detection Systems for OT Networks. SMARTCOMP 2023: 361-366 - 2020
- [c37]Sarra M. Alqahtani, Xinchi He, Rose F. Gamble, Mauricio Papa:
Formal Verification of Functional Requirements for Smart Contract Compositions in Supply Chain Management Systems. HICSS 2020: 1-10 - 2019
- [c36]Xinchi He, Sarra M. Alqahtani, Rose F. Gamble, Mauricio Papa:
Securing Over-The-Air IoT Firmware Updates using Blockchain. COINS 2019: 164-171 - [c35]Xinchi He, Ethan Robards, Rose F. Gamble, Mauricio Papa:
Anomaly Detection Sensors for a Modbus-Based Oil and Gas Well-Monitoring System. ICDIS 2019: 1-8 - [c34]Zachary Hill, John Hale, Mauricio Papa, Peter J. Hawrylak:
Using Bro with a Simulation Model to Detect Cyber-Physical Attacks in a Nuclear Reactor. ICDIS 2019: 22-27 - [c33]Sara Mohammadi, Mauricio Papa, Eduardo Pereyra, Cem Sarica:
Selection of Optimal Closure Relationships for Multiphase Flow using a Genetic Algorithm. ICDIS 2019: 60-67 - [c32]Zachary Hill, John Hale, Mauricio Papa, Peter J. Hawrylak:
Platform-Agnostic Language to Map Control Primitives to SCADA Communication Protocols. ICDIS 2019: 82-88 - [c31]Jonathan West, John Hale, Mauricio Papa, Peter J. Hawrylak:
Automatic Identification of Critical Digital Assets. ICDIS 2019: 219-224 - [c30]Peter J. Hawrylak, George Louthan, John Hale, Mauricio Papa:
Practical Cyber-Security Solutions for the Science DMZ. PEARC 2019: 50:1-50:6 - 2018
- [c29]Will Nichols, Zachary Hill, Peter J. Hawrylak, John Hale, Mauricio Papa:
Automatic Generation of Attack Scripts from Attack Graphs. ICDIS 2018: 267-274 - 2017
- [c28]Zachary Hill, Samuel Chen, Donald Wall, Mauricio Papa, John Hale, Peter J. Hawrylak:
Simulation and analysis framework for cyber-physical systems. CISRC 2017: 7:1-7:4 - [c27]Will Nichols, Peter J. Hawrylak, John Hale, Mauricio Papa:
Introducing priority into hybrid attack graphs. CISRC 2017: 12:1-12:4 - [c26]Peter J. Hawrylak, John Hale, Mauricio Papa:
Undergraduate Educational Pathways for Developing a High-Performance Computing Workforce. PEARC 2017: 53:1-53:4 - 2016
- [c25]Jeyasingam Nivethan, Mauricio Papa:
A SCADA Intrusion Detection Framework that Incorporates Process Semantics. CISRC 2016: 6:1-6:5 - 2014
- [c24]Jeyasingam Nivethan, Mauricio Papa, Peter J. Hawrylak:
Modeling and simulation of electric power substation employing an IEC 61850 network. CISR 2014: 89-92 - [c23]Michael Haney, Mauricio Papa:
A framework for the design and deployment of a SCADA honeynet. CISR 2014: 121-124 - 2013
- [c22]Jeyasingam Nivethan, Mauricio Papa, Peter J. Hawrylak:
Estimating link availability and timing delays in ethernet-based networks. CSIIRW 2013: 46 - 2011
- [c21]Anastasia Mavridou, Mauricio Papa:
A Situational Awareness Architecture for the Smart Grid. ICGS3/e-Democracy 2011: 229-236 - 2009
- [c20]Samuel East, Jonathan Butts, Mauricio Papa, Sujeet Shenoi:
A Taxonomy of Attacks on the DNP3 Protocol. Critical Infrastructure Protection 2009: 67-81 - [c19]Jonathan Butts, Hugo Kleinhans, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi:
Providing Situational Awareness for Pipeline Control Operations. Critical Infrastructure Protection 2009: 97-111 - 2008
- [c18]Ryan Shayto, Brian Porter, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi:
Assessing The Integrity Of Field Devices In Modbus Networks. Critical Infrastructure Protection 2008: 115-128 - 2007
- [c17]Rodrigo Chandia, Jesús González, Tim Kilpatrick, Mauricio Papa, Sujeet Shenoi:
Security Strategies for SCADA Networks. Critical Infrastructure Protection 2007: 117-131 - [c16]Jesús González, Mauricio Papa:
Passive Scanning in Modbus Networks. Critical Infrastructure Protection 2007: 175-187 - [c15]Janica Edmonds, Mauricio Papa, Sujeet Shenoi:
Security Analysis of Multilayer SCADA Protocols. Critical Infrastructure Protection 2007: 205-221 - 2006
- [c14]Jesús González-Pino, Janica Edmonds, Mauricio Papa:
Attribute selection using information gain for a fuzzy logic intrusion detection system. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410D - [c13]Tim Kilpatrick, Jesús González, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi:
An Architecture for SCADA Network Forensics. IFIP Int. Conf. Digital Forensics 2006: 273-285 - 2005
- [c12]Aly El-Semary, Janica Edmonds, Jesús González, Mauricio Papa:
A Framework for Hybrid Fuzzy Logic Intrusion Detection Systems. FUZZ-IEEE 2005: 325-330 - [c11]Aly El-Semary, Janica Edmonds, Jesús González, Mauricio Papa:
Implementation of a Hybrid Intrusion Detection System Using Fuzzyjess. ICEIS (2) 2005: 390-393 - 2004
- [c10]Janica Edmonds, Mauricio Papa:
Cryptographic Protocol Analysis using Goal Extraction. ITCC (1) 2004: 75-80 - 2003
- [c9]Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi:
Integrating Logics and Process Calculi for Cryptographic Protocol Analysis. SEC 2003: 349-360 - 2002
- [c8]Clinton Campbell, Jerald Dawkins, Brandon Pollet, Kenneth Fitch, John Hale, Mauricio Papa:
On Modeling Computer Networks for Vulnerability Analysis. DBSec 2002: 233-244 - [c7]Stephen Magill, Bradley Skaggs, Mauricio Papa, John Hale:
Implementation and Verification of Programmable Security. DBSec 2002: 285-299 - 2001
- [c6]Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi:
Formal Analysis of E-Commerce Protocols. ISADS 2001: 19-28 - 2000
- [c5]John Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi:
Extending Java for Package based Access Control. ACSAC 2000: 67-76 - [c4]Mauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi:
Simulation and Analysis of Cryptographic Protocols. DBSec 2000: 89-100 - 1999
- [c3]John Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi:
Security Policy Coordination for Heterogeneous Information Systems. ACSAC 1999: 219-228 - 1998
- [c2]John Hale, Mauricio Papa, Sujeet Shenoi:
Programmable Security for Object-Oriented Systems. DBSec 1998: 109-123 - 1997
- [c1]M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi:
An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. DBSec 1997: 385-388
Editorship
- 2009
- [e1]Mauricio Papa, Sujeet Shenoi:
Critical Infrastructure Protection II - Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers. IFIP Advances in Information and Communication Technology 290, Springer 2009, ISBN 978-0-387-88522-3 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint