Follow
Sandra Julieta Rueda
Sandra Julieta Rueda
Verified email at uniandes.edu.co - Homepage
Title
Cited by
Cited by
Year
A logical specification and analysis for SELinux MLS policy
B Hicks, S Rueda, L St. Clair, T Jaeger, P McDaniel
ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010
1182010
FlowFence: a denial of service defense system for software defined networking
AFM Piedrahita, S Rueda, DMF Mattos, OCMB Duarte
2015 Global Information Infrastructure and Networking Symposium (GIIS), 1-6, 2015
602015
Integrity walls: Finding attack surfaces from mandatory access control policies
H Vijayakumar, G Jakka, S Rueda, J Schiffman, T Jaeger
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
592012
Leveraging software-defined networking for incident response in industrial control systems
AFM Piedrahita, V Gaur, J Giraldo, AA Cardenas, SJ Rueda
IEEE Software 35 (1), 44-50, 2017
582017
From Trusted to Secure: Building and Executing Applications That Enforce System Security.
B Hicks, SJ Rueda, T Jaeger, PD McDaniel
USENIX Annual Technical Conference 7, 34, 2007
572007
Extending the floodlight controller
LV Morales, AF Murillo, SJ Rueda
2015 IEEE 14th International Symposium on Network Computing and Applications …, 2015
512015
Virtual incident response functions in control systems
AFM Piedrahita, V Gaur, J Giraldo, AA Cardenas, SJ Rueda
Computer Networks 135, 147-159, 2018
452018
An architecture for enforcing end-to-end access control over web applications
B Hicks, S Rueda, D King, T Moyer, J Schiffman, Y Sreenivasan, ...
Proceedings of the 15th ACM symposium on Access control models and …, 2010
372010
Sexual intimacy in the age of smart devices: Are we practicing safe IoT?
M Wynn, K Tillotson, R Kao, A Calderon, A Murillo, J Camargo, R Mantilla, ...
Proceedings of the 2017 workshop on internet of things security and privacy …, 2017
312017
The Android OS stack and its vulnerabilities: an empirical study
A Mazuera-Rozo, J Bautista-Mora, M Linares-Vásquez, S Rueda, ...
Empirical Software Engineering 24, 2056-2101, 2019
222019
Verifying Compliance of Trusted Programs.
SJ Rueda, D King, T Jaeger
USENIX Security Symposium, 321-334, 2008
192008
Flexible security configuration for virtual machines
S Rueda, Y Sreenivasan, T Jaeger
Proceedings of the 2nd ACM workshop on Computer security architectures, 35-44, 2008
182008
Blockchain and artificial intelligence for network security
DMF Mattos, F Krief, SJ Rueda
Annals of Telecommunications 75, 101-102, 2020
172020
Analysis of virtual machine system policies
S Rueda, H Vijayakumar, T Jaeger
Proceedings of the 14th ACM symposium on Access control models and …, 2009
152009
Transforming commodity security policies to enforce Clark-Wilson integrity
D Muthukumaran, S Rueda, N Talele, H Vijayakumar, J Teutsch, T Jaeger
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
132012
Integrating SELinux with security-typed languages
B Hicks, S Rueda, T Jaeger, P McDaniel
Proceedings of the 3rd SELinux Symposium, 2007
132007
A virtual environment for industrial control systems: A nonlinear use-case in attack detection, identification, and response
AF Murillo, LF Cómbita, AC Gonzalez, S Rueda, AA Cardenas, N Quijano
Proceedings of the 4th Annual Industrial Control System Security Workshop, 25-32, 2018
122018
SDN and NFV security: challenges for integrated solutions
AF Murillo, SJ Rueda, LV Morales, ÁA Cárdenas
Guide to Security in SDN and NFV: Challenges, Opportunities, and …, 2017
122017
Unsupervised and incremental learning orchestration for cyber‐physical security
LHA Reis, A Murillo Piedrahita, S Rueda, NC Fernandes, DSV Medeiros, ...
Transactions on emerging telecommunications technologies 31 (7), e4011, 2020
112020
Comprehensive security for body area networks: A survey
LV Morales, D Delgado-Ruiz, SJ Rueda
Int. J. Netw. Secur 21, 342-354, 2019
112019
The system can't perform the operation now. Try again later.
Articles 1–20