Follow
Sandra Julieta Rueda
Sandra Julieta Rueda
Verified email at uniandes.edu.co - Homepage
Title
Cited by
Cited by
Year
A logical specification and analysis for SELinux MLS policy
B Hicks, S Rueda, L St. Clair, T Jaeger, P McDaniel
ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010
1222010
Integrity walls: Finding attack surfaces from mandatory access control policies
H Vijayakumar, G Jakka, S Rueda, J Schiffman, T Jaeger
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
682012
Leveraging software-defined networking for incident response in industrial control systems
AFM Piedrahita, V Gaur, J Giraldo, AA Cardenas, SJ Rueda
IEEE Software 35 (1), 44-50, 2017
662017
FlowFence: a denial of service defense system for software defined networking
AFM Piedrahita, S Rueda, DMF Mattos, OCMB Duarte
2015 Global Information Infrastructure and Networking Symposium (GIIS), 1-6, 2015
622015
From Trusted to Secure: Building and Executing Applications That Enforce System Security.
B Hicks, SJ Rueda, T Jaeger, PD McDaniel
USENIX Annual Technical Conference 7, 34, 2007
602007
Extending the floodlight controller
LV Morales, AF Murillo, SJ Rueda
2015 IEEE 14th International Symposium on Network Computing and Applications …, 2015
562015
Virtual incident response functions in control systems
AFM Piedrahita, V Gaur, J Giraldo, AA Cardenas, SJ Rueda
Computer Networks 135, 147-159, 2018
492018
An architecture for enforcing end-to-end access control over web applications
B Hicks, S Rueda, D King, T Moyer, J Schiffman, Y Sreenivasan, ...
Proceedings of the 15th ACM symposium on Access control models and …, 2010
422010
Sexual intimacy in the age of smart devices: Are we practicing safe IoT?
M Wynn, K Tillotson, R Kao, A Calderon, A Murillo, J Camargo, R Mantilla, ...
Proceedings of the 2017 workshop on internet of things security and privacy …, 2017
342017
The Android OS stack and its vulnerabilities: an empirical study
A Mazuera-Rozo, J Bautista-Mora, M Linares-Vásquez, S Rueda, ...
Empirical Software Engineering 24, 2056-2101, 2019
282019
Blockchain and artificial intelligence for network security
DMF Mattos, F Krief, SJ Rueda
Annals of Telecommunications 75, 101-102, 2020
202020
Verifying Compliance of Trusted Programs.
SJ Rueda, D King, T Jaeger
USENIX Security Symposium, 321-334, 2008
192008
A virtual environment for industrial control systems: A nonlinear use-case in attack detection, identification, and response
AF Murillo, LF Cómbita, AC Gonzalez, S Rueda, AA Cardenas, N Quijano
Proceedings of the 4th Annual Industrial Control System Security Workshop, 25-32, 2018
172018
Flexible security configuration for virtual machines
S Rueda, Y Sreenivasan, T Jaeger
Proceedings of the 2nd ACM workshop on Computer security architectures, 35-44, 2008
172008
Analysis of virtual machine system policies
S Rueda, H Vijayakumar, T Jaeger
Proceedings of the 14th ACM symposium on Access control models and …, 2009
152009
Unsupervised and incremental learning orchestration for cyber‐physical security
LHA Reis, A Murillo Piedrahita, S Rueda, NC Fernandes, DSV Medeiros, ...
Transactions on emerging telecommunications technologies 31 (7), e4011, 2020
142020
Comprehensive security for body area networks: A survey
LV Morales, D Delgado-Ruiz, SJ Rueda
Int. J. Netw. Secur 21, 342-354, 2019
132019
SDN and NFV security: challenges for integrated solutions
AF Murillo, SJ Rueda, LV Morales, ÁA Cárdenas
Guide to Security in SDN and NFV: Challenges, Opportunities, and …, 2017
132017
Transforming commodity security policies to enforce Clark-Wilson integrity
D Muthukumaran, S Rueda, N Talele, H Vijayakumar, J Teutsch, T Jaeger
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
132012
Integrating SELinux with security-typed languages
B Hicks, S Rueda, T Jaeger, P McDaniel
Proceedings of the 3rd SELinux Symposium, 2007
132007
The system can't perform the operation now. Try again later.
Articles 1–20