Carlos E. Rubio-Medrano
Orcid: 0000-0001-8931-6412
According to our database1,
Carlos E. Rubio-Medrano
authored at least 38 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Ultrafusion: Optimal Fuzzy Fusion in Land-Cover Segmentation Using Multiple Panchromatic Satellite Images.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Pairing Human and Artificial Intelligence: Enforcing Access Control Policies with LLMs and Formal Specifications.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
SecureCheck: User-Centric and Geolocation-Aware Access Mediation Contracts for Sharing Private Data.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
By the Numbers: Towards Standard Evaluation Metrics for Programmable Logic Controllers' Defenses.
Proceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security, 2024
Proceedings of the 19th International Conference on Software Technologies, 2024
Proceedings of the Sixth Workshop on CPS&IoT Security and Privacy, 2024
2023
Inf. Syst. Frontiers, April, 2023
SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
USDOT Tier-1 University Transportation Center for Advancing Cybersecurity Research and Education.
Proceedings of the IEEE International Conference on Mobility, 2023
No-Fly-Zone: Regulating Drone Fly-Overs Via Government and User-Controlled Authorization Zones.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023
Poster: No Fly-Zone: Drone Policies for Ensuring Safe Operations in Restricted Areas.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023
2022
"Flawed, but like democracy we don't have a better system": The Experts' Insights on the Peer Review Process of Evaluating Security Papers.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
2021
<i>ExSol</i>: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems.
DTRAP, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android.
Proceedings of the Secure Knowledge Management In The Artificial Intelligence Era, 2021
Poster: DyPolDroid: User-Centered Counter-Policies Against Android Permission-Abuse Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality Technologies.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
2020
Toward Automated Enforcement of Cyber-Physical Security Requirements for Energy Delivery Systems.
Proceedings of the Second IEEE International Conference on Trust, 2020
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems.
Proceedings of the 7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018
2017
OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
Proceedings of the 2017 Workshop on Moving Target Defense, 2017
2016
Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control.
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016
2015
EAI Endorsed Trans. Collab. Comput., 2015
Federated Access Management for Collaborative Network Environments: Framework and Case Study.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
2013
Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
2007
Architectural Assertions: Checking Architectural Constraints at Run-Time.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007
Random Test Data Generation for Java Classes Annotated with JML Specifications.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007