Carlos E. Rubio-Medrano

Orcid: 0000-0001-8931-6412

According to our database1, Carlos E. Rubio-Medrano authored at least 38 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Ultrafusion: Optimal Fuzzy Fusion in Land-Cover Segmentation Using Multiple Panchromatic Satellite Images.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

SoK: Security of Programmable Logic Controllers.
Proceedings of the 33rd USENIX Security Symposium, 2024

Pairing Human and Artificial Intelligence: Enforcing Access Control Policies with LLMs and Formal Specifications.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024

Circles of Trust: A Voice-Based Authorization Scheme for Securing IoT Smart Homes.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024

SecureCheck: User-Centric and Geolocation-Aware Access Mediation Contracts for Sharing Private Data.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024

By the Numbers: Towards Standard Evaluation Metrics for Programmable Logic Controllers' Defenses.
Proceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security, 2024

Asserting Frame Properties.
Proceedings of the 19th International Conference on Software Technologies, 2024

ICSNet: A Hybrid-Interaction Honeynet for Industrial Control Systems.
Proceedings of the Sixth Workshop on CPS&IoT Security and Privacy, 2024

2023
DyPolDroid: Protecting Against Permission-Abuse Attacks in Android.
Inf. Syst. Frontiers, April, 2023

SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

USDOT Tier-1 University Transportation Center for Advancing Cybersecurity Research and Education.
Proceedings of the IEEE International Conference on Mobility, 2023

No-Fly-Zone: Regulating Drone Fly-Overs Via Government and User-Controlled Authorization Zones.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

Poster: No Fly-Zone: Drone Policies for Ensuring Safe Operations in Restricted Areas.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

2022
"Flawed, but like democracy we don't have a better system": The Experts' Insights on the Peer Review Process of Evaluating Security Papers.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
<i>ExSol</i>: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems.
DTRAP, 2021

Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service.
Proceedings of the 30th USENIX Security Symposium, 2021

DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android.
Proceedings of the Secure Knowledge Management In The Artificial Intelligence Era, 2021

Poster: DyPolDroid: User-Centered Counter-Policies Against Android Permission-Abuse Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality Technologies.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
Toward Automated Enforcement of Cyber-Physical Security Requirements for Energy Delivery Systems.
Proceedings of the Second IEEE International Conference on Trust, 2020

Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Towards Effective Verification of Multi-Model Access Control Properties.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems.
Proceedings of the 7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, 2019

Understanding and Predicting Private Interactions in Underground Forums.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

2017
OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

2016
Federated Access Management for Collaborative Environments.
PhD thesis, 2016

Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control.
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016

2015
Achieving Security Assurance with Assertion-based Application Construction.
EAI Endorsed Trans. Collab. Comput., 2015

Federated Access Management for Collaborative Network Environments: Framework and Case Study.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

2013
Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Supporting secure collaborations with attribute-based access control.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2007
Architectural Assertions: Checking Architectural Constraints at Run-Time.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007

Random Test Data Generation for Java Classes Annotated with JML Specifications.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007


  Loading...