Erisa Karafili

Orcid: 0000-0002-8250-4389

According to our database1, Erisa Karafili authored at least 35 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Hybrid Threat Model for Smart Systems.
IEEE Trans. Dependable Secur. Comput., 2023

A Methodology for Cybersecurity Risk Assessment in Supply Chains.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
Forensic analysis of Tor in Windows environment: A case study.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
AI applications of data sharing in agriculture 4.0: A framework for role-based data access control.
Int. J. Inf. Manag., 2021

Time-stamped claim logic.
Log. J. IGPL, 2021

Private Data Harvesting on Alexa Using Third-Party Skills.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2021

2020
An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks.
Digit. Investig., 2020

Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning.
Proceedings of the NOMS 2020, 2020

Automatic Firewalls' Configuration Using Argumentation Reasoning.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2020

2019
An Argumentation-Based Approach to Assist in the Investigation and Attribution of Cyber-Attacks.
CoRR, 2019

2018
An argumentation reasoning approach for data processing.
Comput. Ind., 2018

Helping Forensic Analysts to Attribute Cyber-Attacks: An Argumentation-Based Reasoner.
Proceedings of the PRIMA 2018: Principles and Practice of Multi-Agent Systems - 21st International Conference, Tokyo, Japan, October 29, 2018

A Logic-Based Reasoner for Discovering Authentication Vulnerabilities Between Interconnected Accounts.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018

A Formal Approach to Analyzing Cyber-Forensics Evidence.
Proceedings of the Computer Security, 2018

Policy Support for Autonomous Swarms of Drones.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018

Access Control and Quality Attributes of Open Data: Applications and Techniques.
Proceedings of the Business Information Systems Workshops, 2018

2017
Non-monotonic reasoning rules for energy efficiency.
J. Ambient Intell. Smart Environ., 2017

Verification techniques for policy based systems.
Proceedings of the 2017 IEEE SmartWorld, 2017

Argumentation-based policy analysis for drone systems.
Proceedings of the 2017 IEEE SmartWorld, 2017

Decision-making in policy governed human-autonomous systems teams.
Proceedings of the 2017 IEEE SmartWorld, 2017

Next generation firewalls for dynamic coalitions.
Proceedings of the 2017 IEEE SmartWorld, 2017

Enabling Data Sharing in Contextual Environments: Policy Representation and Analysis.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Mission Support for Drones: a Policy Based Approach.
Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, 2017

Improving data sharing in data rich environments.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Argumentation-Based Security for Social Good.
Proceedings of the 2017 AAAI Fall Symposia, Arlington, Virginia, USA, November 9-11, 2017, 2017

2016
Formalizing Threat Models for Virtualized Systems.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Defeasible Reasoning about Electric Consumptions.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
How to Trust the Re-use of Data.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

Improving Energy Saving Techniques by Ambient Intelligence Scheduling.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Tableau systems for reasoning about risk.
J. Ambient Intell. Humaniz. Comput., 2014

Energy Saving by Ambient Intelligence Techniques.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

2013
A complete tableau procedure for risk analysis.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

2012
Towards a Logical Framework for Reasoning about Risk.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Blocking Underhand Attacks by Hidden Coalitions.
Proceedings of the ICAART 2011 - Proceedings of the 3rd International Conference on Agents and Artificial Intelligence, Volume 2, 2011

2010
Blocking Underhand Attacks by Hidden Coalitions (Extended Version)
CoRR, 2010


  Loading...