Emil C. Lupu

Orcid: 0000-0002-2844-3917

Affiliations:
  • Imperial College London, UK


According to our database1, Emil C. Lupu authored at least 175 papers between 1995 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Which Attacks Lead to Hazards? Combining Safety and Security Analysis for Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2024

2023
A Hybrid Threat Model for Smart Systems.
IEEE Trans. Dependable Secur. Comput., 2023

Redundancy Planning for Cost Efficient Resilience to Cyber Attacks.
IEEE Trans. Dependable Secur. Comput., 2023

Threat Modelling in Internet of Things (IoT) Environment Using Dynamic Attack Graphs.
CoRR, 2023

ICCPS: Impact discovery using causal inference for cyber attacks in CPSs.
CoRR, 2023

Hyperparameter Learning under Data Poisoning: Analysis of the Influence of Regularization via Multiobjective Bilevel Optimization.
CoRR, 2023

2022
Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception.
Proceedings of the 43rd IEEE Security and Privacy, 2022

HA-Grid: Security Aware Hazard Analysis for Smart Grids.
Proceedings of the IEEE International Conference on Communications, 2022

Jacobian Ensembles Improve Robustness Trade-Offs to Adversarial Attacks.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

2021
Extracting Randomness from the Trend of IPI for Cryptographic Operations in Implantable Medical Devices.
IEEE Trans. Dependable Secur. Comput., 2021

Regularization Can Help Mitigate Poisoning Attacks... with the Right Hyperparameters.
CoRR, 2021

Real-time Detection of Practical Universal Adversarial Perturbations.
CoRR, 2021

Object Removal Attacks on LiDAR-based 3D Object Detectors.
CoRR, 2021

Universal Adversarial Robustness of Texture and Shape-Biased Models.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

Jacobian Regularization for Mitigating Universal Adversarial Perturbations.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021

Analyzing the Viability of UAV Missions Facing Cyber Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

Shadow-Catcher: Looking into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks.
Digit. Investig., 2020

Robustness and Transferability of Universal Attacks on Compressed Models.
CoRR, 2020

GhostBuster: Looking Into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing.
CoRR, 2020

Regularisation Can Mitigate Poisoning Attacks: A Novel Analysis Based on Multiobjective Bilevel Optimisation.
CoRR, 2020

Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning.
Proceedings of the NOMS 2020, 2020

Hazard Driven Threat Modelling for Cyber Physical Systems.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020

2019
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs.
IEEE Trans. Dependable Secur. Comput., 2019

Organizational cloud security and control: a proactive approach.
Inf. Technol. People, 2019

Universal Adversarial Perturbations to Understand Robustness of Texture vs. Shape-biased Training.
CoRR, 2019

Byzantine-Robust Federated Machine Learning through Adaptive Model Averaging.
CoRR, 2019

Poisoning Attacks with Generative Adversarial Nets.
CoRR, 2019

Sensitivity of Deep Convolutional Networks to Gabor Noise.
CoRR, 2019

An Argumentation-Based Approach to Assist in the Investigation and Attribution of Cyber-Attacks.
CoRR, 2019

Towards more practical software-based attestation.
Comput. Networks, 2019

Defending against poisoning attacks in online learning settings.
Proceedings of the 27th European Symposium on Artificial Neural Networks, 2019

Exploiting Correlations to Detect False Data Injections in Low-Density Wireless Sensor Networks.
Proceedings of the 5th ACM on Cyber-Physical System Security Workshop, 2019

Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Efficient Attack Countermeasure Selection Accounting for Recovery and Action Costs.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Determining Resilience Gains From Anomaly Detection for Event Integrity in Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2018

Scoping the Cyber Security Body of Knowledge.
IEEE Secur. Priv., 2018

Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Neural Networks.
CoRR, 2018

Mitigation of Adversarial Attacks through Embedded Feature Selection.
CoRR, 2018

Extracting Randomness From The Trend of IPI for Cryptographic Operators in Implantable Medical Devices.
CoRR, 2018

Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection.
CoRR, 2018

An argumentation reasoning approach for data processing.
Comput. Ind., 2018

Self-Generation of Access Control Policies.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Helping Forensic Analysts to Attribute Cyber-Attacks: An Argumentation-Based Reasoner.
Proceedings of the PRIMA 2018: Principles and Practice of Multi-Agent Systems - 21st International Conference, Tokyo, Japan, October 29, 2018

Label Sanitization Against Label Flipping Poisoning Attacks.
Proceedings of the ECML PKDD 2018 Workshops, 2018

A Logic-Based Reasoner for Discovering Authentication Vulnerabilities Between Interconnected Accounts.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018

Policy Support for Autonomous Swarms of Drones.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018

Access Control and Quality Attributes of Open Data: Applications and Techniques.
Proceedings of the Business Information Systems Workshops, 2018

2017
Efficient Attack Graph Analysis through Approximate Inference.
ACM Trans. Priv. Secur., 2017

Don't fool Me!: Detection, Characterisation and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2017

Unity is strength!: combining attestation and measurements inspection to handle malicious data injections in WSNs.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Verification techniques for policy based systems.
Proceedings of the 2017 IEEE SmartWorld, 2017

Argumentation-based policy analysis for drone systems.
Proceedings of the 2017 IEEE SmartWorld, 2017

Decision-making in policy governed human-autonomous systems teams.
Proceedings of the 2017 IEEE SmartWorld, 2017

Next generation firewalls for dynamic coalitions.
Proceedings of the 2017 IEEE SmartWorld, 2017

Enabling Data Sharing in Contextual Environments: Policy Representation and Analysis.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Mission Support for Drones: a Policy Based Approach.
Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, 2017

Tracking the bad guys: An efficient forensic methodology to trace multi-step attacks using core attack graphs.
Proceedings of the 13th International Conference on Network and Service Management, 2017

Naggen: A network attack graph generation tool - IEEE CNS 17 poster.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization.
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017

Improving data sharing in data rich environments.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Research challenges in dynamic policy-based autonomous security.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Argumentation-Based Security for Social Good.
Proceedings of the 2017 AAAI Fall Symposia, Arlington, Virginia, USA, November 9-11, 2017, 2017

2016
Attestation in Wireless Sensor Networks: A Survey.
ACM Comput. Surv., 2016

Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems.
ACM Comput. Surv., 2016

Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection.
CoRR, 2016

Formalizing Threat Models for Virtualized Systems.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

2015
Detecting Malicious Data Injections in Event Detection Wireless Sensor Networks.
IEEE Trans. Netw. Serv. Manag., 2015

Federating Policy-Driven Autonomous Systems: Interaction Specification and Management Patterns.
J. Netw. Syst. Manag., 2015

Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey.
ACM Comput. Surv., 2015

Exact Inference Techniques for the Dynamic Analysis of Attack Graphs.
CoRR, 2015

On re-assembling self-managed components.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Sharing Data through Confidential Clouds: An Architectural Perspective.
Proceedings of the 1st IEEE/ACM International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 2015

Compositional Reliability Analysis for Probabilistic Component Automata.
Proceedings of the 7th IEEE/ACM International Workshop on Modeling in Software Engineering, 2015

2014
On efficient meta-data collection for crowdsensing.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

LTSA-PCA: tool support for compositional reliability analysis.
Proceedings of the 36th International Conference on Software Engineering, 2014

Associating locations from wearable cameras.
Proceedings of the British Machine Vision Conference, 2014

2012
Self-Management Framework for Mobile Autonomous Systems.
J. Netw. Syst. Manag., 2012

2011
Policy Driven Remote Attestation.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011

Learning User Behaviours in Real Mobile Domains.
Proceedings of the Latest Advances in Inductive Logic Programming, 2011

Inductive Logic Programming in Answer Set Programming.
Proceedings of the Inductive Logic Programming - 21st International Conference, 2011

Multi-agent Confidential Abductive Reasoning.
Proceedings of the Technical Communications of the 27th International Conference on Logic Programming, 2011

Model-based Self-Adaptive Components: A preliminary approach.
Proceedings of the 2011 Imperial College Computing Student Workshop, 2011

Policy refinement: Decomposition and operationalization for dynamic domains.
Proceedings of the 7th International Conference on Network and Service Management, 2011

Refinement of History-Based Policies.
Proceedings of the Logic Programming, Knowledge Representation, and Nonmonotonic Reasoning, 2011

Multi-agent abductive reasoning with confidentiality.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

2010
Engineering Policy-Based Ubiquitous Systems.
Comput. J., 2010

Mobile PAES: Demonstrating Authority Devolution for Policy Evaluation in Crisis Management Scenarios.
Proceedings of the POLICY 2010, 2010

Coordinating Data Usage Control in Loosely-Connected Networks.
Proceedings of the POLICY 2010, 2010

Inductive Logic Programming as Abductive Search.
Proceedings of the Technical Communications of the 26th International Conference on Logic Programming, 2010

Secure cross-domain data sharing architecture for crisis management.
Proceedings of the 10th ACM Workshop on Digital Rights Management, 2010

A Labelling System for Derived Data Control.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Distributed Abductive Reasoning with Constraints.
Proceedings of the Declarative Agent Languages and Technologies VIII, 2010

Decomposition techniques for policy refinement.
Proceedings of the 6th International Conference on Network and Service Management, 2010

An opportunistic authority evaluation scheme for data security in crisis management scenarios.
Proceedings of the 5th ACM Symposium on Information, 2010

Revising Process Models through Inductive Learning.
Proceedings of the Business Process Management Workshops, 2010

2009
A lightweight policy system for body sensor networks.
IEEE Trans. Netw. Serv. Manag., 2009

Policy conflict analysis for diffserv quality of service management.
IEEE Trans. Netw. Serv. Manag., 2009

Security policy refinement using data integration: a position paper.
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009

Verification of Policy-Based Self-Managed Cell Interactions Using Alloy.
Proceedings of the POLICY 2009, 2009

Vesta: A secure and autonomic system for pervasive healthcare.
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009

Realising management and composition of Self-Managed Cells in pervasive healthcare.
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009

Securing Body Sensor Networks: Sensor Association and Key Management.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

A Policy-Based Management Architecture for Mobile Collaborative Teams.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

A Mission Management Framework for Unmanned Autonomous Vehicles.
Proceedings of the Mobile Wireless Middleware, 2009

Using argumentation logic for firewall configuration management.
Proceedings of the Integrated Network Management, 2009

Learning Rules from User Behaviour.
Proceedings of the Artificial Intelligence Applications and Innovations III, 2009

Self-healing for Pervasive Computing Systems.
Proceedings of the Architecting Dependable Systems VII, 2009

Ponder2: A Policy System for Autonomous Pervasive Environments.
Proceedings of the Fifth International Conference on Autonomic and Autonomous Systems, 2009

PAES: Policy-Based Authority Evaluation Scheme.
Proceedings of the Data and Applications Security XXIII, 2009

Expressive policy analysis with enhanced system dynamicity.
Proceedings of the 2009 ACM Symposium on Information, 2009

Multi-agent planning with confidentiality.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

2008
Reconfigurable Architecture for Network Flow Analysis.
IEEE Trans. Very Large Scale Integr. Syst., 2008

AMUSE: autonomic management of ubiquitous e-Health systems.
Concurr. Comput. Pract. Exp., 2008

Ponder2 - A Policy Environment for Autonomous Pervasive Systems.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Adaptive self-management of teams of autonomous vehicles.
Proceedings of the 6th International Workshop on Middleware for Pervasive and Ad-hoc Computing (MPAC 2008), 2008

Finger: An efficient policy system for body sensor networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

An Efficient Policy System for Body Sensor Networks.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

Panel Session: What Are the Key Challenges in Distributed Security?.
Proceedings of the Data and Applications Security XXII, 2008

A Role-Based Infrastructure for the Management of Dynamic Communities.
Proceedings of the Resilient Networks and Services, 2008

2007
Towards Supporting Interactions between Self-Managed Cells.
Proceedings of the First International Conference on Self-Adaptive and Self-Organizing Systems, 2007

Autonomous Pervasive Systems and the Policy Challenges of a Small World!
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Towards Learning Privacy Policies.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Self-Managed Cell: A Middleware for Managing Body-Sensor Networks.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Dynamic Ontology Mapping for Interacting Autonomous Systems.
Proceedings of the Self-Organizing Systems, Second International Workshop, 2007

Policy-based Management for Body-Sensor Networks.
Proceedings of the 4th International Workshop on Wearable and Implantable Body Sensor Networks, 2007

Ponder2 - Policy-Based Self Managed Cells.
Proceedings of the Inter-Domain Management, 2007

Risk Based Authorisation for Mobile Ad Hoc Networks.
Proceedings of the Inter-Domain Management, 2007

Abstractions to Support Interactions Between Self-Managed Cells.
Proceedings of the Inter-Domain Management, 2007

2006
Policy refinement for IP differentiated services Quality of Service management.
IEEE Trans. Netw. Serv. Manag., 2006

Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

An Event Service Supporting Autonomic Management of Ubiquitous Systems for e-Health.
Proceedings of the 26th International Conference on Distributed Computing Systems Workshops (ICDCS 2006 Workshops), 2006

Using Argumentation Logic for Firewall Policy Specification and Analysis.
Proceedings of the Large Scale Management of Distributed Systems, 2006

2005
Aspects of Trusted and Secure Business-Oriented VO Management in Service Oriented Architectures.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology Workshops (CEC 2005 Workshops), 2005

An Efficient Access Control Model for Mobile Ad-Hoc Communities.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

Policy Conflict Analysis for Quality of Service Management.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

Self-managed Cells for Ubiquitous Systems.
Proceedings of the Computer Network Security, 2005

Policy refinement for DiffServ quality of service management.
Proceedings of the Integrated Network Management, 2005

Toward Web Services Profiles for Trust and Security in Virtual Organisations.
Proceedings of the Collaborative Networks and Their Breeding Environments, 2005

A Combined Hardware-Software Architecture for Network Flow.
Proceedings of The 2005 International Conference on Engineering of Reconfigurable Systems and Algorithms, 2005

Self-Managed Cells and their Federation.
Proceedings of the Advanced Information Systems Engineering, 17th International Conference, 2005

2004
Policy-Based Dynamic Reconfiguration of Mobile-Code Applications.
Computer, 2004

A Goal-based Approach to Policy Refinement.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

PONDER policy implementation and validation in a CIM and differentiated services framework.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

PEACE: A Policy-Based Establishment of Ad-hoc Communities.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
An Adaptive Policy-based Framework for Network Services Management.
J. Netw. Syst. Manag., 2003

Using Event Calculus to Formalise Policy Specification and Analysis.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

Indoor location estimation using multiple wireless technologies.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

Irregular Reconfigurable CAM Structures for Firewall Applications.
Proceedings of the Field Programmable Logic and Application, 13th International Conference, 2003

Compiling Policy Descriptions into Reconfigurable Firewall Processors.
Proceedings of the 11th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2003), 2003

2002
Security and management policy specification.
IEEE Netw., 2002

Towards flexible credential verification in mobile ad-hoc networks.
Proceedings of the 2002 Workshop on Principles of Mobile Computing, 2002

An Adaptive Policy Based Management Framework for Differentiated Services Networks.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

Tools for domain-based policy management of distributed systems.
Proceedings of the Management Solutions for the New Communications World, 2002

Development framework for firewall processors.
Proceedings of the 2002 IEEE International Conference on Field-Programmable Technology, 2002

Workflow-Based Composition of Web-Services: A Business Model or a Programming Paradigm?
Proceedings of the 6th International Enterprise Distributed Object Computing Conference (EDOC 2002), 2002

2001
Selected Topics in Network and Systems Management.
Comput. Networks, 2001

The Ponder Policy Specification Language.
Proceedings of the Policies for Distributed Systems and Networks, 2001

A Policy Deployment Model for the Ponder Language.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001

A Policy Language for the Management of Distributed Agents.
Proceedings of the Agent-Oriented Software Engineering II, Second International Workshop, 2001

2000
Ponder: Realising Enterprise Viewpoint Concepts.
Proceedings of the 4th International Enterprise Distributed Object Computing Conference (EDOC 2000), 2000

A Flexible Access Control Service for Java Mobile Code.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
Conflicts in Policy-Based Distributed Systems Management.
IEEE Trans. Software Eng., 1999

Use of Roles and Policies for Specifying and Managing a Virtual Enterprise.
Proceedings of the Ninth International Workshop on Research Issues on Data Engineering: Information Technology for Virtual Enterprises, 1999

The Uses of Role Hierarchies in Access Control.
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999

Policy Specification for Programmable Networks.
Proceedings of the Active Networks, First International Working Conference, 1999

Can Corba save a fringe language from becoming obsolete?
Proceedings of the Distributed Applications and Interoperable Systems II, Second IFIP WG 6.1 International Working Conference on Distributed Applications and Interoperable Systems, June 28, 1999

1998
A role based framework for distributed systems management.
PhD thesis, 1998

1997
Towards a Role-Based Framework for Distributed Systems Management.
J. Netw. Syst. Manag., 1997

Reconciling role based management and role based access control.
Proceedings of the Second Workshop on Role-Based Access Control, 1997

Conflict Analysis for Management Policies.
Proceedings of the Integrated Network Management V, 1997

A Policy Based Role Object Model.
Proceedings of the 1st International Enterprise Distributed Object Computing Conference (EDOC '97), 1997

1996
Role-based security for distributed object systems.
Proceedings of the 5th Workshop on Enabling Technologies, 1996

1995
A policy based role framework for access control.
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995


  Loading...