Damas P. Gruska

Orcid: 0000-0002-8517-4688

According to our database1, Damas P. Gruska authored at least 48 papers between 1990 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
States of Attack Under Incomplete Information.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

2021
Encoding Threshold Boolean Networks into Reaction Systems for the Analysis of Gene Regulatory Networks.
Fundam. Informaticae, 2021

Reversible Attack Trees.
Proceedings of the 12th IEEE Annual Ubiquitous Computing, 2021

Time Insertion Functions.
Proceedings of the Advances in Model and Data Engineering in the Digitalization Era, 2021

Dynamic Attack Trees.
Proceedings of the 3rd Workshop on Artificial Intelligence and Formal Verification, 2021

Process Opacity and Insertion Functions.
Proceedings of the 29th International Workshop on Concurrency, 2021

Security Enforcing.
Proceedings of the Concurrency, Specification and Programming, 2021

Attack Trees with Time Constraints.
Proceedings of the 29th International Workshop on Concurrency, 2021

2019
Studying Opacity of Reaction Systems through Formula Based Predictors.
Fundam. Informaticae, 2019

Modeling and Evaluation of a Power-Aware Algorithm for IoT Bluetooth Low Energy Devices.
Proceedings of the 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), 2019

Security and time insertion.
Proceedings of the 23rd Pan-Hellenic Conference on Informatics, 2019

Security Testing for Multi-Agent Systems.
Proceedings of the Advances in Computational Intelligence, 2019

Security of Low Level IoT Protocols.
Proceedings of the Computational Science - ICCS 2019, 2019

Observations, Testing and Security.
Proceedings of the 28th International Workshop on Concurrency, 2019

Attack Protection Tree.
Proceedings of the 28th International Workshop on Concurrency, 2019

2018
Opacity-enforcing for Process Algebras.
Proceedings of the 27th International Workshop on Concurrency, 2018

Hidden States in Reaction Systems.
Proceedings of the 27th International Workshop on Concurrency, 2018

2016
Differential Privacy and Security.
Fundam. Informaticae, 2016

Analysing of M-AHIDS with Future States on DARPA and KDD99 Benchmarks.
Proceedings of the 25th International Workshop on Concurrency, 2016

Process Environment Opacity.
Proceedings of the 25th International Workshop on Concurrency, 2016

2015
Dynamics Security Policies and Process Opacity for Timed Process Algebras.
Proceedings of the Perspectives of System Informatics, 2015

Sequential P Systems with Active Membranes Working on Sets.
Proceedings of the 24th International Workshop on Concurrency, 2015

Gained and Excluded Classified Actions by Dynamic Security Policies.
Proceedings of the 24th International Workshop on Concurrency, 2015

2014
Simulation Opacity.
Fundam. Informaticae, 2014

Process Opacity for Timed Process Algebra.
Proceedings of the Perspectives of System Informatics, 2014

Multi-Agent Heterogeneous Intrusion Detection System.
Proceedings of the 23th International Workshop on Concurrency, Specification and Programming, Chemnitz, Germany, September 29, 2014

2013
Information Flow Testing.
Fundam. Informaticae, 2013

Opacity Testing.
Proceedings of the 22nd International Workshop on Concurrency, 2013

2012
Quantification of Positive and Negative Attacker's Information.
Fundam. Informaticae, 2012

Informational Analysis of Security and Integrity.
Fundam. Informaticae, 2012

Test Based Security.
Proceedings of the 21th International Workshop on Concurrency, 2012

Information Flow and Concurrent Imperative Languages.
Proceedings of the 21th International Workshop on Concurrency, 2012

2011
Gained and Excluded Private Actions by Process Observations.
Fundam. Informaticae, 2011

2010
Process Algebra Contexts and Security Properties.
Fundam. Informaticae, 2010

A Notion of Biological Diagnosability Inspired by the Notion of Opacity in Systems Security.
Fundam. Informaticae, 2010

Diagnosability of Nested Intruders.
Proceedings of the Bio-Inspired Models of Network, Information, and Computing Systems, 2010

2009
Quantifying Security for Timed Process Algebras.
Fundam. Informaticae, 2009

2008
Security in a Model for Long-running Transactions.
Fundam. Informaticae, 2008

Probabilistic Information Flow Security.
Fundam. Informaticae, 2008

2007
Observation Based System Security.
Fundam. Informaticae, 2007

2006
Network Information Flow.
Fundam. Informaticae, 2006

Information-Flow Attacks Based on Limited Observations.
Proceedings of the Perspectives of Systems Informatics, 2006

2001
Process Algebras for Network Communication.
Fundam. Informaticae, 2001

1997
Bounded Concurrency.
Proceedings of the Fundamentals of Computation Theory, 11th International Symposium, 1997

1996
Process Algebra for Shared Ressources.
Proceedings of the Parcella 1996, 1996

1992
Real-Time Communication Networks.
Proceedings of the Real Time Computing, 1992

Process Communication Environment.
Proceedings of the NAPAW 92, 1992

1990
Genomorphisms of Semi-Modular Lattices.
J. Comput. Syst. Sci., 1990


  Loading...